![Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule](https://www.pdfsearch.io/img/ce53eff882714135fd68431c419fc43d.jpg) Date: 2015-06-29 10:17:00Distributed data storage Computing Concurrent computing File sharing networks Distributed computing File sharing Kademlia Kad network Distributed computing architecture Peer-to-peer Overlay network EMule | | SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and highAdd to Reading ListSource URL: randombits.ioDownload Document from Source Website File Size: 528,44 KBShare Document on Facebook
|