Keyphrases
- information security
- configuration space
- security issues
- network layer
- network security
- security policies
- intrusion detection
- statistical databases
- security requirements
- packet loss
- moving objects
- access control
- computer security
- packet filtering
- security mechanisms
- security threats
- motion estimation
- packet transmission
- security level
- security protocols
- trajectory data
- key management
- encryption scheme
- sensitive data
- smart card