Author:
Caubet Juan,Esparza Oscar,Alins Juanjo,Mata-Díaz Jorge,Soriano Miguel
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Cisco visual networking index: Forecast and methodology (2011-2016),
http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481360_ns827_Networking_Solutions_White_Paper.html
2. Lecture Notes in Computer Science;D.S. Wallach,2003
3. Lecture Notes in Computer Science;L.A. Pintsov,2001
4. Lecture Notes in Computer Science;D.R.L. Brown,2002
5. Fantacci, R., Maccari, L., Rosi, M., Chisci, L., Aiello, L.M., Milanesio, M.: Avoiding eclipse attacks on kad/kademlia: an identity based approach. In: IEEE International Conference on Communications (ICC), Dresden, Germany, pp. 1–5. IEEE Press (June 2009)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. PJ-Sec: secure node joining in mobile P2P networks;CCF Transactions on Pervasive Computing and Interaction;2020-11-03