Author of the publication

Sybil-Resistant DHT Routing.

, , , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 305-318. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SSL Splitting: Securely Serving Data from Untrusted Caches., and . USENIX Security Symposium, USENIX Association, (2003)Sybil-Resistant DHT Routing., , , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 305-318. Springer, (2005)SSL splitting: Securely serving data from untrusted caches., and . Comput. Networks, 48 (5): 763-779 (2005)Persistent personal names for globally connected mobile devices, , , , , and . 7th conference on USENIX Symposium on Operating Systems Design and Implementation, (2006)Whanau: A Sybil-proof Distributed Hash Table., and . NSDI, page 111-126. USENIX Association, (2010)A Sybil-proof one-hop DHT.. SNS, page 19-24. ACM, (2008)