Login / Signup
eDonkey & eMule's Kad: Measurements & Attacks.
Thomas Locher
Stefan Schmid
Roger Wattenhofer
Published in:
Fundam. Informaticae (2011)
Keyphrases
</>
countermeasures
security protocols
data sets
watermarking scheme
malicious users
digital images
watermarking algorithm
computer security
measurement noise
security threats
malicious attacks
genetic algorithm
watermarking technique
terrorist attacks
security flaws