Showing results 1 to 6 of 6
Attacking the Kad Network Wang, P; Tyra, J; Chan-Tin, E; Malchow, T; Foo Kune, D; Hopper, N; Kim, Yongdae, SecureComm 2008. , ICST, 2008-09 |
Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography Cheon, JH; Hopper, N; Kim, Yongdae; Osipkov, I, 10th Conference on Financial Cryptography and Data Security, International Financial Cryptography Association, 2006-03-01 |
Combating doublespending using cooperative P2P systems Osipkov, I; Vasserman, E; Hopper, N; Kim, Yongdae, 2007 IEEE Conference on Distributed Computing Systems (ICDCS), IEEE, 2007-06 |
Hashing it out in public: Common failure modes of DHT-based anonymity schemes Tran, A; Hopper, N; Kim, Yongdae, Workshop on Privacy in the Electronic Society (WPES), 2009 , ACM, 2009-11-09 |
Robust Accounting in Decentralized P2P Storage Systems Osipkov, I; Wang, P; Hopper, N; Kim, Yongdae, The 26th IEEE Conference on Distributed Computing systems (ICDCS), IEEE, 2006-07 |
Towards Complete Node Enumeration in a Peer-to-Peer Botnet Kang, B; Chan-Tin, E; Lee, C; Tyra, J; Kang, H; Nunnery, C; Wadler, Z; et al, ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) , ACM, 2009-03 |
Discover