<--- Back to Details
First PageDocument Content
File sharing networks / Software / Computing / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Distributed hash table / Kademlia / BitTorrent / Gnutella
Date: 2015-05-18 12:16:31
File sharing networks
Software
Computing
File sharing
EDonkey network
Kad network
EMule
Peer-to-peer
Distributed hash table
Kademlia
BitTorrent
Gnutella

Poisoning the Kad Network

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Download Document from Source Website

File Size: 396,95 KB

Share Document on Facebook

Similar Documents

GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

DocID: 1rh3L - View Document

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

DocID: 1r92H - View Document

Poisoning the Kad Network

Poisoning the Kad Network

DocID: 1r1lv - View Document

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

DocID: 1qHqY - View Document

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

DocID: 1qCno - View Document