Login / Signup
Securing pseudo identities in an anonymous peer-to-peer file-sharing network.
Tom Chothia
Published in:
SecureComm (2007)
Keyphrases
</>
peer to peer file sharing
peer to peer
campus network
congestion control
network structure
overlay network
network traffic
traffic analysis
complex networks
network management