DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chan-Tin, Eric | - |
dc.contributor.author | Wang, Peng | - |
dc.contributor.author | Tyra, James | - |
dc.contributor.author | Malchow, Tyson | - |
dc.contributor.author | Kune, Denis Foo | - |
dc.contributor.author | Hopper, Nicholas | - |
dc.contributor.author | Kim, Yongdae | - |
dc.date.accessioned | 2013-03-28T07:10:51Z | - |
dc.date.available | 2013-03-28T07:10:51Z | - |
dc.date.issued | 2009-05 | - |
dc.identifier.citation | Wiley Security and Communication Networks, 2009 , v., no., pp. - | - |
dc.identifier.uri | http://hdl.handle.net/10203/163755 | - |
dc.language | ENG | - |
dc.publisher | IEEE | - |
dc.title | Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN - | - |
dc.type | Conference | - |
dc.type.rims | CONF | - |
dc.citation.publicationname | Wiley Security and Communication Networks, 2009 | - |
dc.identifier.conferencecountry | Norway | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.nonIdAuthor | Chan-Tin, Eric | - |
dc.contributor.nonIdAuthor | Wang, Peng | - |
dc.contributor.nonIdAuthor | Tyra, James | - |
dc.contributor.nonIdAuthor | Malchow, Tyson | - |
dc.contributor.nonIdAuthor | Kune, Denis Foo | - |
dc.contributor.nonIdAuthor | Hopper, Nicholas | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.