Login / Signup
Evaluation of Sybil Attacks Protection Schemes in KAD.
Thibault Cholez
Isabelle Chrisment
Olivier Festor
Published in:
AIMS (2009)
Keyphrases
</>
protection schemes
operating system
malicious users
database
data collection
access control
intrusion detection