Article,

Authentication in stealth distributed hash tables.

, , , , and .
J. Syst. Archit., 54 (6): 607-618 (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews