Login / Signup

Attack and Correction: How to Design a Secure and Efficient Mix Network.

Kun Peng
Published in: J. Inf. Process. Syst. (2012)
Keyphrases
  • peer to peer overlay
  • network design
  • case study
  • peer to peer
  • computer networks
  • lightweight
  • network traffic
  • attack graphs
  • highly efficient
  • network model
  • cost efficient
  • security measures
  • attack graph