Conducting routing table poisoning attack in DHT networks
Although a lot of users share their information via Distributed Hash Table (i.e., DHT) network, a noticeable shortcoming of such a file-sharing system is that they can hardly preserve the users' privacies. To address such a problem, in this paper we propose a suite of security strategies for th...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Schreiben Sie den ersten Kommentar!