If you are interested in this type of thing, I highly recommend reading
"A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resources", by Uruena, M. ; Cuevas, R. ; Cuevas, A. ; Banchs, A. in Communications Letters, IEEE Volume: 17, Issue: 2 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6412682&tag=1 _______________________________________________ P2PSIP mailing list [email protected] https://www.ietf.org/mailman/listinfo/p2psip
