Author:Reshmi Mitra
KeyphrasesAnonymity, cryptographic security, Interest-based, Latency, P2P, P2P networks, Privacy, Public-Key Security, Residue class2, secured data transfer, star network, structured P2P network, trustworthy computing, zero-knowledge proof. |