Sciweavers

TCC
2009
Springer
132views Cryptology» more  TCC 2009»
15 years 5 days ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky