At Tue, 19 Feb 2008 10:42:34 +0800,
Song Yongchao wrote:
> We prepare slides for our security analysis draft to discuss in the mailing
> list. The security issues with each P2P layer are included in these slides.
> We also classify the application scenarios into two types: (1) overlay with
> Trusted Overlay Base and (2) overlay with Untrusted Overlay Base, security
> issues and possible attacks with these two types of scenarios are analyzed.
> 
> Please check the attached file to find the slides for our security analysis
> draft.

Please don't send 800KB files to the mailing list. Put them
on a Web site and link to them.

-Ekr


_______________________________________________
P2PSIP mailing list
[email protected]
http://www.ietf.org/mailman/listinfo/p2psip

Reply via email to