×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [routing attacks]
Tempering Kademlia with a Robust Identity-based System Luca Aiello, Marco Milanesio, Giancarlo Ruffo, and Rossano Schifanella Giancarlo Ruffo SecNet Group
217 views
Fun and Games with SSL Traffic Analysis Vincent Berg
223 views
Embedding identity in DHT systems: security, reputation and social networking management 1 Embedding Identity in DHT Systems: Security, Reputation and
221 views
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system
215 views
PROTOCOL MECHNISM FOR SECURITY ppt
42 views
Routing Jurnal
8 views
SECURITY IN SENSOR NETWORKS BY SASIKIRAN V.L. REDDY STUDENT NO.6603240
217 views
How to bypass the firewall Guo, Pei November 06, 2006
218 views
Data Security and Encryption (CSE348) 1. Lecture # 28 2
216 views
1 The XIA Future Internet Architecture and its Testbed-based Evaluation Peter Steenkiste, Dave Andersen, David Eckhardt, Sara Kiesler, Jon Peha, Adrian
213 views
Industry and Academia Building Bridges CIO Forum April 2014
213 views
Smartening the Environment using Wireless Sensor Networks in a Developing Country
42 views