![File sharing networks / Distributed data storage / File sharing / Denial-of-service attacks / BitTorrent / Kad network / EMule / Peer-to-peer / Kademlia / Distributed hash table / EDonkey network / Denial-of-service attack File sharing networks / Distributed data storage / File sharing / Denial-of-service attacks / BitTorrent / Kad network / EMule / Peer-to-peer / Kademlia / Distributed hash table / EDonkey network / Denial-of-service attack](https://www.pdfsearch.io/img/05c502b6060f8793a3b0c7f02da3776a.jpg) Date: 2014-09-26 08:36:29File sharing networks Distributed data storage File sharing Denial-of-service attacks BitTorrent Kad network EMule Peer-to-peer Kademlia Distributed hash table EDonkey network Denial-of-service attack | | Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethzAdd to Reading ListSource URL: disco.ethz.chDownload Document from Source Website File Size: 403,50 KBShare Document on Facebook
|