<div dir="ltr">On Sun, Aug 25, 2013 at 12:12 PM, Perry E. Metzger <span dir="ltr"><<a href="mailto:perry@piermont.com" target="_blank">perry@piermont.com</a>></span> wrote:<br><div class="gmail_extra"><div class="gmail_quote">

<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">Anyone care to shed some light? Pointers to literature are especially<br>


welcome</blockquote><div><br></div><div>Check out this paper: Security Considerations for Peer-to-Peer Distributed Hash Tables</div><div><br></div><div><a href="http://and.they.can.be.quite.long.3.4.0.f.0.6.a.0.1.0.0.2.ip6.arpa/~bauerm/names/DHTsec.pdf">http://and.they.can.be.quite.long.3.4.0.f.0.6.a.0.1.0.0.2.ip6.arpa/~bauerm/names/DHTsec.pdf</a> </div>

</div><div><br></div>-- <br>Tony Arcieri<br>
</div></div>