Document content
n
The document was not presented in SF and
as a reminder this is the current content
q
Security threats
q
Comparison between C/S and P2P
q
Security Analysis with P2P Layers
q
Security Analysis with Application Scenarios
q
Interconnection to other networks