Security Considerations for Peer-to-Peer Distributed Hash Tables.
Emil SitRobert Tappan MorrisPublished in: IPTPS (2002)
Keyphrases
- peer to peer
- distributed hash tables
- peer to peer networks
- directory service
- query processing
- distributed hash table
- resource discovery
- overlay network
- peer to peer systems
- load balancing
- access control
- network security
- file sharing
- security policies
- data sharing
- intrusion detection
- ad hoc networks
- information security
- distributed computing
- video streaming
- distributed environment
- digital libraries
- grid computing
- metadata
- information resources
- wireless networks