The Exclusion of Malicious Routing Peers in Structured P2P Systems
The Exclusion of Malicious Routing Peers in Structured P2P Systems. Authors: Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong , and Jong Kim Source: Agents and Peer-to-Peer Computing, LNCS 4461, pp. 43-50, 2008 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Normal routing in Chord. Finger Table. K54. Query: K54.
201 views • 10 slides