Author:Swathi Kaluvakuri
KeyphrasesAnonymity2, Broadcast, Capacity-constrained, Chinese Remainder Theorem, cryptographic security, Cryptography, Interest-based, multicast protocol, Overlay Multicast, P2P network, Public-Key Security, Pyramid tree, Residue class3, Security, structured P2P network3. |