Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
- Groupware applications deal with propagation of changes to networked users, consistency maintenance on concurrent access, and provision of awareness. We have built a P2P groupwar...
Today a common goal in the area of email security is to provide protection from a wide variety of threats by being more predictive instead of reactive and to identify legitimate m...