Login / Signup
Controlling Incoming Connections Using Certificates and Distributed Hash Tables.
Dmitrij Lagutin
Hannu H. Kari
Published in:
NEW2AN (2007)
Keyphrases
</>
distributed hash tables
peer to peer
access control
query processing
peer to peer networks
e learning
distance learning
video streaming
public key infrastructure