Login / Signup

Controlling Incoming Connections Using Certificates and Distributed Hash Tables.

Dmitrij LagutinHannu H. Kari
Published in: NEW2AN (2007)
Keyphrases
  • distributed hash tables
  • peer to peer
  • access control
  • query processing
  • peer to peer networks
  • e learning
  • distance learning
  • video streaming
  • public key infrastructure