Secure routing in peer-to-peer distributed hash tables.
Keith NeedelsMinseok KwonPublished in: SAC (2009)
Keyphrases
- peer to peer
- distributed hash tables
- secure routing
- ad hoc networks
- peer to peer networks
- query processing
- network topology
- routing protocol
- biological inspired
- routing algorithm
- overlay network
- distributed hash table
- data sharing
- load balancing
- peer to peer systems
- resource discovery
- distributed environment
- multi hop
- distributed computing
- mobile ad hoc networks
- video streaming
- grid computing
- digital libraries
- wifi
- routing scheme
- mobile networks
- base station
- database
- directory service
- data transmission