Login / Signup
Survey of Six Myths and Oversights about Distributed Hash Tables' Security.
Sylvain Dahan
Mitsuhisa Sato
Published in:
ICDCS Workshops (2007)
Keyphrases
</>
information security
security issues
intrusion detection
access control
distributed hash tables
directory service
databases
peer to peer
intelligent agents
end to end
distributed environment
security policies