Check out the new USENIX Web site. next up previous
Next: Whisper Implementation Up: Listen and Whisper: Security Previous: Detailed Algorithm


Implementation

In this section, we will describe the implementation of Listen and Whisper and their overhead characteristics.



Subsections

116 2004-02-12