Document content
n The document was not presented in SF and
as a reminder this is the current content
q Security threats
q Comparison between C/S and P2P
q Security Analysis with P2P Layers
q Security Analysis with Application Scenarios
q Interconnection to other networks