Date: 2015-06-29 10:17:00Distributed data storage Computing Concurrent computing File sharing networks Distributed computing File sharing Kademlia Kad network Distributed computing architecture Peer-to-peer Overlay network EMule | | SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and highAdd to Reading ListSource URL: randombits.ioDownload Document from Source Website File Size: 528,44 KBShare Document on Facebook
|