Login / Signup

Survey of Six Myths and Oversights about Distributed Hash Tables' Security.

Sylvain DahanMitsuhisa Sato
Published in: ICDCS Workshops (2007)
Keyphrases
  • information security
  • security issues
  • intrusion detection
  • access control
  • distributed hash tables
  • directory service
  • databases
  • peer to peer
  • intelligent agents
  • end to end
  • distributed environment
  • security policies