Communications protocol
Data transmission
Protocols
Adversarial system
Social peer-to-peer processes
Sybil attack
Peer-to-peer
Adversary
Inference
Information
Data
Logic