Distributed Hash Table Implementation to Enable Security and Combat Malpractices
Main Article Content
Security has become a global problem in any field. Everyday millions of cyber crimes are being recorded worldwide. Many of them include unethical hacking, unauthorized hampering of files and many more. To avoid such malicious practices many technologies have come up. One such security is DHT or Distributed hash tables. A recently upcoming cyber security, it helps the receiver and sender to send and receive files that are authentic. It also helps to find out if the file is manipulated or tampered by a third party or an unauthorized user by generating unique hash values. This paper mainly focuses on such distributed networks and the security they provide in order to stop malpractices.
How to Cite
T. Venkat Narayana Rao, D., Vivek , K., & Pranita , C. (2019). Distributed Hash Table Implementation to Enable Security and Combat Malpractices. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 5(2), 09–12. Retrieved from https://ijfrcsce.org/index.php/ijfrcsce/article/view/1846