12 results on '"Dinger, J."'
Search Results
2. Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems
3. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration
4. Extension for information card systems to achieve User-Controlled Automated Identity Delegation.
5. User-Controlled Automated Identity Delegation.
6. A Consistency Model for Identity Information in Distributed Systems.
7. FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management.
8. A Techno-Legal Perspective on Peer-to-Peer-Based Bandwidth on Demand Management.
9. ECSE: an efficient environment for layered communication protocols.
10. On the challenge of assessing overlay topology adaptation mechanisms.
11. On the Challenge of Assessing Overlay Topology Adaptation Mechanisms
12. Experiences with the use of OSI management infrastructures.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.