Stealth modification versus nuisance attacks in the LOCKSS peer-to-peer digital preservation system

Author: Roussopoulos Mema  

Publisher: Springer Publishing Company

ISSN: 1936-6442

Source: Peer-to-Peer Networking and Applications, Vol.3, Iss.4, 2010-12, pp. : 265-276

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract