Search Results - "Aiello, L.M"

  • Showing 1 - 3 results of 3
Refine Results
  1. 1
  2. 2

    Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach by Fantacci, R., Maccari, L., Rosi, M., Chisci, L., Aiello, L.M., Milanesio, M.

    “…Kademlia is a Distributed hash table widely used in P2P networks that has been applied to commercial and non commercial distribution of files. In this paper…”
    Get full text
    Conference Proceeding
  3. 3

    Tempering Kademlia with a Robust Identity Based System by Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.

    “…The lack of a trusted authority, responsible for peers' identity verification or for authentication purposes, makes actual P2P systems extremely vulnerable to…”
    Get full text
    Conference Proceeding