Login / Signup
A Containment-Based Security Model for Cycle-Stealing P2P Applications.
Ankur Gupta
Lalit Kumar Awasthi
Published in:
Inf. Secur. J. A Glob. Perspect. (2010)
Keyphrases
</>
security model
peer to peer
public key
access control
security analysis
security requirements
provably secure
designated verifier
public key cryptography
smart card
database systems
databases
wireless sensor networks
distributed environment
data sharing