Document content
nThe document was not presented in SF and as a reminder this is the current content
qSecurity threats
qComparison between C/S and P2P
qSecurity Analysis with P2P Layers
qSecurity Analysis with Application Scenarios
qInterconnection to other networks