Author:
Danezis George,Laurie Ben
Publisher
Springer Berlin Heidelberg
Reference42 articles.
1. Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil-resistant DHT routing, vol. [42], pp. 305–318.
2. Wright, R.N., Lincoln, P., Millen, J.K.: Depender graphs: A method of fault-tolerant certificate distribution. Journal of Computer Security 9(4), 323–338 (2001)
3. Song, D.X., Tygar, J.D., Zuckerman, D.: Expander graphs for digital stream authentication and robust overlay networks. In: IEEE Symposium on Security and Privacy, p. 258 (2002)
4. Roe, M.: Cryptography and Evidence. PhD thesis, University of Cambridge, Computer Laboratory (1997)
5. Internet troll. From Wikipedia, the free encyclopedia (2005), http://en.wikipedia.org/wiki/Internet_troll