A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won't Do.
Bernd PrünsterDominik ZieglerChristian KollmannBojan SuzicPublished in: SecureComm (2) (2018)
Keyphrases
- peer to peer
- security issues
- information assurance
- information security
- security requirements
- access control
- peer to peer networks
- data sharing
- overlay network
- security threats
- security properties
- fault tolerance
- digital libraries
- distributed computing
- network security
- client server
- peer to peer systems
- theorem proving
- data mining
- encryption scheme
- security mechanisms
- key management
- security level
- security problems
- ad hoc networks
- security measures
- content sharing