An efficient methodology to limit path length guaranteeing anonymity in overlay networks

  1. Muñoz-Gea, J.P.
  2. Malgosa-Sanahuja, J.
  3. Manzanares-Lopez, P.
  4. Sanchez-Aarnoutse, J.C.
  5. Garcia-Haro, J.
Proceedings:
SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings

ISBN: 9789898111593

Year of publication: 2008

Pages: 205-208

Type: Conference paper