Bill Yeager

Learn More
When one begins to think about security and P2P networks, and in particular, ad-hoc P2P networks with no real centralization, one must take a leap from the accepted, in place, on-the-Internet, security practices into the unknown. There are potentially billions of peer nodes, some related, and some not, all possibly vulnerable to attack in a multitude of(More)
This Mini-track has been a step-by-step evolution from HICSS-42’s “Architectures for Distributed Systems”; “Distributed System’s for Ubiquitous Computing” that added the connected everywhere theme; “Cloud Computing”; four mini-tracks on “Secure Cloud Computing”; and finally HICSS-49’s “Securing the Cloud and the Internet of Things (IoT),” here noting the(More)
  • 1