Passwords in peer-to-peer | IEEE Conference Publication | IEEE Xplore