Overlay topology optimization and security studies in peer-to-peer systems

Full text