Conducting routing table poisoning attack in DHT networks

Although a lot of users share their information via Distributed Hash Table (i.e., DHT) network, a noticeable shortcoming of such a file-sharing system is that they can hardly preserve the users' privacies. To address such a problem, in this paper we propose a suite of security strategies for th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Haiman Lin, Ruilin Ma, Li Guo, Peng Zhang, XiaoJun Chen
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!