Shared Experiential History for Encryption Based Peer-To-Peer Authentication.
Joshua GreenXianbin WangPublished in: PIMRC (2023)
Keyphrases
- peer to peer
- encryption decryption
- identity authentication
- data encryption
- image authentication
- integrity verification
- public key cryptography
- virtual private network
- elliptic curve cryptography
- security analysis
- key management
- ad hoc networks
- biometric authentication
- authentication scheme
- secret key
- encryption scheme
- key distribution
- encryption algorithms
- user authentication
- file sharing
- overlay network
- distributed computing
- resource discovery
- conceptual framework
- data sharing
- secure communication
- public key infrastructure
- video streaming
- public key
- image encryption
- security mechanisms
- elliptic curve
- digital libraries
- key exchange
- content sharing
- high security
- peer to peer systems