![Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule](https://www.pdfsearch.io/img/e697586249fad1d25429ef196b184adc.jpg) Date: 2011-08-15 19:32:40Distributed data storage Computing Concurrent computing File sharing networks Distributed computing File sharing Kademlia Kad network Distributed computing architecture Peer-to-peer Overlay network EMule | | SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and highAdd to Reading ListSource URL: www.cs.okstate.eduDownload Document from Source Website File Size: 528,44 KBShare Document on Facebook
|