[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Gzz] PEG: Attacking against GISP
From: |
Hermanni Hyytiälä |
Subject: |
Re: [Gzz] PEG: Attacking against GISP |
Date: |
06 Jun 2003 14:53:31 +0300 |
On Fri, 2003-06-06 at 14:06, Tuomas Lukka wrote:
>
> > - A hostile (or faulty) peer(s) stores lot of dummy key-value-pairs with
> > a certain key
>
> Does GISP allow several values per key?
Like DSHT ? No.
>
> > During the simulation process we will use a single hostile (or faulty)
> > peer
> > or a group of hostile/faulty peers (fraction of all peers) in the test
> > network.
> >
> > By using above scenarios, we want to clarify GISP's properties with
> > regard to research
> > questions.
> >
> > *=We start the simulation process with these scenarios.
>
> Next you should describe the exact scenarios you want to try,
> so start with the dumb peer and specify it exactly.
>
> Then run the test.
Ok.
-Hermanni
- [Gzz] PEG: Attacking against GISP, Hermanni Hyytiälä, 2003/06/06
- Re: [Gzz] PEG: Attacking against GISP, Tuomas Lukka, 2003/06/06
- Re: [Gzz] PEG: Attacking against GISP,
Hermanni Hyytiälä <=
- Re: [Gzz] PEG: Attacking against GISP, Tuomas Lukka, 2003/06/06
- Re: [Gzz] PEG: Attacking against GISP, Benja Fallenstein, 2003/06/07
- Re: [Gzz] PEG: Attacking against GISP, Hermanni Hyytiälä, 2003/06/09
- Re: [Gzz] PEG: Attacking against GISP, Benja Fallenstein, 2003/06/09
- Re: [Gzz] PEG: Attacking against GISP, Hermanni Hyytiälä, 2003/06/09
- Second post: Re: [Gzz] PEG: Attacking against GISP, Hermanni Hyytiälä, 2003/06/09
- Re: Second post: Re: [Gzz] PEG: Attacking against GISP, Benja Fallenstein, 2003/06/09
- Re: Second post: Re: [Gzz] PEG: Attacking against GISP, Hermanni Hyytiälä, 2003/06/10