


default search action
"Attacking the kad network - real world evaluation and high fidelity ..."
Peng Wang et al. (2013)
- Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim
:
Attacking the kad network - real world evaluation and high fidelity simulation using DVN. Secur. Commun. Networks 6(12): 1556-1575 (2013)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.