Login / Signup
Attack and Correction: How to Design a Secure and Efficient Mix Network.
Kun Peng
Published in:
J. Inf. Process. Syst. (2012)
Keyphrases
</>
peer to peer overlay
network design
case study
peer to peer
computer networks
lightweight
network traffic
attack graphs
highly efficient
network model
cost efficient
security measures
attack graph