The Frog-Boiling Attack: Limitations of Secure Network Coordinate SystemsJan 1, 2011ยทEric Chan-Tin,Victor Heorhiadi,Nicholas Hopper,Yongdae Kimยท 0 min read DOILast updated on Jan 1, 2011 AuthorsEric Chan-TinAuthorsVictor HeorhiadiAuthorsNicholas HopperAuthorsYongdae Kim← SocialCloud: Using Social Networks for Building Distributed Computing Services Jan 1, 2011Understanding Social Networks Properties for Trustworthy Computing Jan 1, 2011 →