[1]
D. T. Venkat Narayana Rao, K. Vivek, and C. Pranita, “Distributed Hash Table Implementation to Enable Security and Combat Malpractices”, ijfrcsce, vol. 5, no. 2, pp. 09–12, Feb. 2019.