gzz-dev
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Gzz] PEG: Attacking against GISP


From: Hermanni Hyytiälä
Subject: Re: [Gzz] PEG: Attacking against GISP
Date: 06 Jun 2003 14:53:31 +0300

On Fri, 2003-06-06 at 14:06, Tuomas Lukka wrote:

> 
> > - A hostile (or faulty) peer(s) stores lot of dummy key-value-pairs with
> > a certain key
> 
> Does GISP allow several values per key?


Like DSHT ? No.

> 
> > During the simulation process we will use a single hostile (or faulty)
> > peer
> > or a group of hostile/faulty peers (fraction of all peers) in the test
> > network. 
> > 
> > By using above scenarios, we want to clarify GISP's properties with
> > regard to research 
> > questions.
> > 
> > *=We start the simulation process with these scenarios.  
> 
> Next you should describe the exact scenarios you want to try,
> so start with the dumb peer and specify it exactly.
> 
> Then run the test.

Ok.



-Hermanni






reply via email to

[Prev in Thread] Current Thread [Next in Thread]