At Tue, 19 Feb 2008 10:42:34 +0800, Song Yongchao wrote: > We prepare slides for our security analysis draft to discuss in the mailing > list. The security issues with each P2P layer are included in these slides. > We also classify the application scenarios into two types: (1) overlay with > Trusted Overlay Base and (2) overlay with Untrusted Overlay Base, security > issues and possible attacks with these two types of scenarios are analyzed. > > Please check the attached file to find the slides for our security analysis > draft.
Please don't send 800KB files to the mailing list. Put them on a Web site and link to them. -Ekr _______________________________________________ P2PSIP mailing list [email protected] http://www.ietf.org/mailman/listinfo/p2psip
