Login / Signup

Securing pseudo identities in an anonymous peer-to-peer file-sharing network.

Tom Chothia
Published in: SecureComm (2007)
Keyphrases
  • peer to peer file sharing
  • peer to peer
  • campus network
  • congestion control
  • network structure
  • overlay network
  • network traffic
  • traffic analysis
  • complex networks
  • network management