Bayesian Analysis of Secure P2P Sharing Protocols.
Esther PalomarAlmudena AlcaideJuan M. Estévez-TapiadorJulio César Hernández CastroPublished in: OTM Conferences (2) (2007)
Keyphrases
- bayesian analysis
- data sharing
- homomorphic encryption
- file sharing
- peer to peer
- cryptographic protocols
- security protocols
- key distribution
- key exchange
- key agreement protocol
- authentication protocol
- computationally feasible
- resource sharing
- multi party
- secure multiparty computation
- key establishment
- application level
- security services
- information sharing
- security properties
- overlay network
- statistically sound
- privacy preserving
- data access
- rights management
- security analysis
- sensitive data
- peer to peer networks
- secure communication
- key management
- security requirements
- trust relationships
- security issues
- group communication
- content sharing
- encryption scheme
- trusted third party
- wireless sensor networks
- search space
- public key cryptosystems
- digital libraries