Authentication in Stealth Distributed Hash Tables | IEEE Conference Publication | IEEE Xplore