@dblp

Pushback for Overlay Networks: Protecting Against Malicious Insiders.

, , and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 39-54. (2008)

Links and resources

Tags