Measurement and mitigation of BitTorrent leecher attacks
Computer Communications
Active measurement of routing table in Kad
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Avoiding eclipse attacks on kad/kademlia: an identity based approach
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Preventing DDoS attacks on internet servers exploiting P2P systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
What is the impact of p2p traffic on anomaly detection?
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Copyright protection in P2P networks by false pieces pollution
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Hi-index | 0.00 |
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash ...