An Anonymity Scheme Based on Pseudonym in P2P Networks.
H. Peng, S. Lu, J. Li, A. Zhang, and D. Zhao. e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-293. Springer, (2010)
@inproceedings{conf/eforensics/PengLLZZ10,
added-at = {2024-02-15T00:00:00.000+0100},
author = {Peng, Hao and Lu, Songnian and Li, Jianhua and Zhang, Aixin and Zhao, Dandan},
biburl = {https://www.bibsonomy.org/bibtex/2b5d2f1f54ac82cc9f707bfd29cafde77/dblp},
booktitle = {e-Forensics},
crossref = {conf/eforensics/2010},
editor = {Lai, Xuejia and Gu, Dawu and Jin, Bo and Wang, Yongquan and Li, Hui},
ee = {http://eudl.eu/doi/10.1007/978-3-642-23602-0_28},
interhash = {80531e4b7b2b1ccc7b1725df4f8c02f4},
intrahash = {b5d2f1f54ac82cc9f707bfd29cafde77},
isbn = {978-3-642-23601-3},
keywords = {dblp},
pages = {287-293},
publisher = {Springer},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
timestamp = {2024-04-10T08:27:49.000+0200},
title = {An Anonymity Scheme Based on Pseudonym in P2P Networks.},
url = {http://dblp.uni-trier.de/db/conf/eforensics/eforensics2010.html#PengLLZZ10},
volume = 56,
year = 2010
}