A survey of DHT security techniques
From MaRDI portal
Publication:2875041
DOI10.1145/1883612.1883615zbMath1293.68040OpenAlexW2004075592MaRDI QIDQ2875041
Guillaume Pierre, Maarten van Steen, Guido Urdaneta
Publication date: 13 August 2014
Published in: ACM Computing Surveys (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1883612.1883615
Network design and communication in computer systems (68M10) Performance evaluation, queueing, and scheduling in the context of computer systems (68M20) Distributed systems (68M14)
Related Items (4)
A brief introduction to distributed systems ⋮ Resource Burning for Permissionless Systems (Invited Paper) ⋮ Bankrupting Sybil despite churn ⋮ Decentralized polling with respectable participants
This page was built for publication: A survey of DHT security techniques