Login / Signup
Exploring the storj network: a security analysis.
Sammy de Figueiredo
Akash Madhusudan
Vincent Reniers
Svetla Nikova
Bart Preneel
Published in:
SAC (2021)
Keyphrases
</>
security analysis
smart card
high security
security requirements
public key
network traffic
security model
computer networks
security properties
image encryption
data mining
peer to peer
operating system
distributed systems
authentication protocol
authentication scheme
wireless sensor networks