Security Research
Authentication and Confidentiality in Conferencing
Watercasting - using properties of multicast
Aids to deployability of M/c
All need active code in the network
Previous slide
Next slide
Back to first slide
View graphic version