LINK SHIFT
Abstract
Link Shift is a decentralized peer-to-peer communication platform designed to enhance secure and private digital interactions without relying on centralized servers. It enables devices to connect directly for seamless messaging and file sharing while eliminating the risks of data breaches and third-party surveillance. The system uses strong end-to-end encryption to ensure complete confidentiality and introduces a temporary anonymous link feature for one-time secure exchanges without revealing user identity. Built for scalability and adaptability, Link Shift provides fast and reliable communication across networks, offering a privacy-focused alternative to traditional centralized platforms and meeting the growing demand for secure and efficient digital communication solutions.
References
Alavi, M., & Leidner, D. E. (2001). Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25(1), 107–136. Retrieved from https://www.jstor.org/stable/3250961
Bengio, Y., Courville, A., & Vincent, P. (2013). Representation learning: A review and new perspectives. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(8), 1798–1828. Retrieved from https://ieeexplore.ieee.org/document/6576785
Devlin, J., Chang, M.-W., Lee, K., & Toutanova, K. (2019). BERT: Pre-training of deep bidirectional transformers for language understanding. Proceedings of NAACL-
HLT 2019. Retrieved from https://arxiv.org/abs/1810.04805
Gygli, M., Grabner, H., Riemenschneider, H., & Van Gool, L. (2014). Creating
summaries from user videos. Proceedings of the European Conference on Computer Vision (ECCV) 2014. Retrieved from
https://www.vision.ee.ethz.ch/~gygli/papers/gygli_eccv14.pdf
Effrey, L. Eppinger. (2005). TCP connections for P2P apps: A software approach to solving the NAT problem. Technical Report CMU-ISRI-05-104, Carnegie Mellon University, 1, 143–156.
Setty, V., van Steen, M., Vitenberg, R., & Voulgaris, S. (2012). Poldercast: Fast, robust and scalable architecture for P2P topic-based pub/sub. Middleware 2012, Springer Berlin Heidelberg, 6, 271–291.
Tai, S. (2018). Continuous, trustless and fair: Changing priorities in services computing. Advances in Service-Oriented and Cloud Computing, Springer International Publishing, 3, 205–210.
Johnston, M., & Burnett, J. (2019). Secure peer-to-peer communication using WebRTC. IEEE Communications Standards Magazine, 3(3), 34–41. 46
Saint-Andre, P., & Miller, M. (2020). End-to-end encryption in decentralized communication systems. ACM Transactions on Privacy and Security, 23(4), 1–18.
Hardt, D., & Jones, M. (2021). OAuth and secure token-based authentication for peer applications. IEEE Internet Computing, 25(2), 44–53.
Refbacks
- There are currently no refbacks.