Mobility Helps Peer-to-Peer Security.
Srdjan CapkunJean-Pierre HubauxLevente ButtyánPublished in: IEEE Trans. Mob. Comput. (2006)
Keyphrases
- peer to peer
- information security
- load balancing
- network security
- ns simulator
- overlay network
- security policies
- intrusion detection
- security issues
- ad hoc networks
- authentication protocol
- data sharing
- security requirements
- fault tolerance
- security level
- resource discovery
- peer to peer networks
- computer security
- access control
- sensitive data
- statistical databases
- grid computing
- distributed computing
- smart card
- client server
- digital libraries