stealthdht
Performance modelling of peer-to-peer routing
Stealth Distributed Hash Table: A robust and flexible super-peered DHT
Authentication in Stealth Distributed Hash Tables
Performance analysis of Stealth DHT with mobile nodes.
Stealth Distributed Hash Table: Unleashing the Real Potential of Peer-to-Peer