Return to Article Details Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays Download Download PDF