Keyphrases
- peer to peer
- digital signature scheme
- distributed hash table
- distributed systems
- load balancing
- data structure
- overlay network
- key management
- security analysis
- electronic transactions
- cryptographic protocols
- user authentication
- digital libraries
- database systems
- security protocols
- digital signature
- information systems
- security level
- security mechanisms
- authentication scheme
- data encryption
- data sharing