Showing results 1 to 3 of 3
Attacking the Kad Network Wang, P; Tyra, J; Chan-Tin, E; Malchow, T; Foo Kune, D; Hopper, N; Kim, Yongdae, SecureComm 2008. , ICST, 2008-09 |
Robust Accounting in Decentralized P2P Storage Systems Osipkov, I; Wang, P; Hopper, N; Kim, Yongdae, The 26th IEEE Conference on Distributed Computing systems (ICDCS), IEEE, 2006-07 |
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks Wang, P; Kim, Yongdae; Kher, V; Kwon, T, Applied Cryptography and Network Security 2005 (ACNS 2005). , iTwin, 2005-06 |
Discover