Survey of Six Myths and Oversights about Distributed Hash Tables' Security | IEEE Conference Publication | IEEE Xplore