Return to Article Details Use of peer-to-peer networks for secured communication Download Download PDF