Login / Signup

Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach.

Romano FantacciLeonardo MaccariMatteo RosiLuigi ChisciLuca Maria AielloMarco Milanesio
Published in: ICC (2009)
Keyphrases
  • open source
  • countermeasures
  • source code
  • open source projects
  • case study
  • wireless sensor networks
  • digital images
  • security mechanisms
  • computer security
  • denial of service attacks
  • malicious attacks