Tempering Kademlia with a Robust Identity-based System Luca Aiello, Marco Milanesio, Giancarlo Ruffo, and Rossano Schifanella Giancarlo Ruffo SecNet Group.
Fun and Games with SSL Traffic Analysis Vincent Berg.
Embedding identity in DHT systems: security, reputation and social networking management 1 Embedding Identity in DHT Systems: Security, Reputation and.
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
PROTOCOL MECHNISM FOR SECURITY ppt
Routing Jurnal
SECURITY IN SENSOR NETWORKS BY SASIKIRAN V.L. REDDY STUDENT NO.6603240.
How to bypass the firewall Guo, Pei November 06, 2006.
Data Security and Encryption (CSE348) 1. Lecture # 28 2.
1 The XIA Future Internet Architecture and its Testbed-based Evaluation Peter Steenkiste, Dave Andersen, David Eckhardt, Sara Kiesler, Jon Peha, Adrian.
Industry and Academia Building Bridges CIO Forum April 2014.
Smartening the Environment using Wireless Sensor Networks in a Developing Country