×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [malicious participants]
Technology
MOINC Server Manager
300 views
Documents
1 Secure Sensor Routing A Clean-Slate Approach Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig Carnegie Mellon University
218 views
Documents
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Robert Morris Ion Stoica, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT
223 views
Documents
Collaborative, Privacy-Preserving Data Aggregation at Scale Michael J. Freedman Princeton University Joint work with: Benny Applebaum, Haakon Ringberg,
218 views
Documents
Security potpourri INF 123 – Software architecture
[email protected]
(Slides from Dick Taylor and Crista Lopes) 1
214 views
Documents
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University
222 views
Documents
On the Impact of Malicious Players in Distributed Systems
27 views
Documents
Collaborative, Privacy-Preserving Data Aggregation at Scale
35 views