Author:Indranil Roy
KeyphrasesAnonymity, Architecture, Broadcast, Cloud, cryptographic security, document categorization, Fog, Interest-based, Latency, LDEPTH, machine learning, neural networks, non-dht, P2P2, P2P network, P2P networks, Privacy, Public-Key Security, Pyramid tree2, Residue class4, secured data transfer, star network, structured P2P network3, text classification, text mining, Tree diameter, trustworthy computing, zero-knowledge proof. |