Authenticated Adversarial Routing

The aim of this paper is to demonstrate the feasibility of authenticated throughput-efficient routing in an unreliable and dynamically changing synchronous network in which the majority of malicious insiders try to destroy and alter messages or disrupt communication in any way. More specifically, in...

Full description

Saved in:
Bibliographic Details
Published in:Journal of cryptology Vol. 27; no. 4; pp. 636 - 771
Main Authors: Amir, Yair, Bunn, Paul, Ostrovsky, Rafail
Format: Journal Article
Language:English
Published: Boston Springer US 01.10.2014
Springer
Springer Nature B.V
Subjects:
ISSN:0933-2790, 1432-1378
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first