Securing Structured Overlays against Identity Attacks.
Krishna P. N. PuttaswamyHeather ZhengBen Y. ZhaoPublished in: IEEE Trans. Parallel Distributed Syst. (2009)
Keyphrases
- identity management
- countermeasures
- structured learning
- real world
- information security
- watermarking scheme
- malicious users
- scalable distributed
- peer to peer
- structured data
- overlay network
- traffic analysis
- computer security
- security protocols
- watermarking algorithm
- watermarking method
- database
- cloud computing
- web applications
- neural network