Stealthdht

Performance modelling of peer-to-peer routing

Stealth Distributed Hash Table: A robust and flexible super-peered DHT

Authentication in Stealth Distributed Hash Tables

Performance analysis of Stealth DHT with mobile nodes.

Stealth Distributed Hash Table: Unleashing the Real Potential of Peer-to-Peer