Login / Signup

ID mapping attacks in P2P networks.

Davide CerriAlessandro GhioniStefano ParaboschiSimone Tiraboschi
Published in: GLOBECOM (2005)
Keyphrases
  • peer to peer
  • countermeasures
  • cooperative
  • security mechanisms
  • java card
  • real time
  • watermarking scheme
  • watermarking algorithm
  • computer security
  • file sharing
  • image watermarking