If you are interested in this type of thing, I highly recommend reading

"A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord 
Resources",  by Uruena, M. ; Cuevas, R. ; Cuevas, A. ; Banchs, A.  in 
Communications Letters, IEEE Volume: 17, Issue: 2


http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6412682&tag=1


_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to