Login / Signup

Authentication in stealth distributed hash tables.

Andrew MacQuireAndrew BramptonIdris A. RaiNicholas J. P. RaceLaurent Mathy
Published in: J. Syst. Archit. (2008)
Keyphrases
  • distributed hash tables
  • peer to peer
  • peer to peer networks
  • query processing
  • biometric authentication
  • authentication protocol
  • user authentication
  • databases
  • data structure