Login / Signup
Authentication in stealth distributed hash tables.
Andrew MacQuire
Andrew Brampton
Idris A. Rai
Nicholas J. P. Race
Laurent Mathy
Published in:
J. Syst. Archit. (2008)
Keyphrases
</>
distributed hash tables
peer to peer
peer to peer networks
query processing
biometric authentication
authentication protocol
user authentication
databases
data structure