Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 751
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorChan-Tin, Eric-
dc.contributor.authorWang, Peng-
dc.contributor.authorTyra, James-
dc.contributor.authorMalchow, Tyson-
dc.contributor.authorKune, Denis Foo-
dc.contributor.authorHopper, Nicholas-
dc.contributor.authorKim, Yongdae-
dc.date.accessioned2013-03-28T07:10:51Z-
dc.date.available2013-03-28T07:10:51Z-
dc.date.issued2009-05-
dc.identifier.citationWiley Security and Communication Networks, 2009 , v., no., pp. --
dc.identifier.urihttp://hdl.handle.net/10203/163755-
dc.languageENG-
dc.publisherIEEE-
dc.titleAttacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN --
dc.typeConference-
dc.type.rimsCONF-
dc.citation.publicationnameWiley Security and Communication Networks, 2009-
dc.identifier.conferencecountryNorway-
dc.contributor.localauthorKim, Yongdae-
dc.contributor.nonIdAuthorChan-Tin, Eric-
dc.contributor.nonIdAuthorWang, Peng-
dc.contributor.nonIdAuthorTyra, James-
dc.contributor.nonIdAuthorMalchow, Tyson-
dc.contributor.nonIdAuthorKune, Denis Foo-
dc.contributor.nonIdAuthorHopper, Nicholas-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0