End-to-End Key Exchange through Disjoint Paths in P2P Networks
Due to their inherent features, P2P networks have proven to be effective in the exchange of data between autonomous peers. Unfortunately, these networks are subject to various security threats that cannot be addressed readily since traditional security infrastructures, which are centralized, cannot...
Main Authors: | Daouda Ahmat, Damien Magoni, Tegawendé F. Bissyandé |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2015-01-01
|
Series: | EAI Endorsed Transactions on Security and Safety |
Subjects: | |
Online Access: | http://eudl.eu/doi/10.4108/sesa.2.3.e3 |
Similar Items
-
Side-channel security on key exchange protocol: Timing and relay attacks
by: Adnan, S.F.S, et al.
Published: (2018) -
Research of user key management mechanisms in the cloud
by: Іван Федорович Аулов
Published: (2016-06-01) -
Two-round contributory group key exchange protocol for wireless network environments
by: Wu Tsu-Yang, et al.
Published: (2011-01-01) -
Diffie-Hellman Key Exchange through Steganographied Images
by: Amine Khaldi
Published: (2018-05-01) -
Design of Secure Chatting Application with End to End Encryption for Android Platform
by: Ammar Hammad Ali1, et al.
Published: (2017-06-01)