Sphinx: Locating Malicious Nodes in CorporateDistributed Hash Tables