Preventing Sybil attacks in chord and Kademlia protocols.
Zied TrifaPublished in: Int. J. Internet Protoc. Technol. (2019)
Keyphrases
- security protocols
- malicious users
- cryptographic protocols
- countermeasures
- security flaws
- malicious attacks
- watermarking scheme
- security mechanisms
- communication protocols
- traffic analysis
- denial of service attacks
- computer security
- malicious nodes
- security threats
- chosen plaintext
- chord progressions
- terrorist attacks
- watermarking method
- data mining
- application level
- file sharing
- intrusion detection