A conventional approach to secret balloting in computer networks.
Jing-Jang HwangPublished in: Comput. Secur. (1996)
Keyphrases
- computer networks
- network security
- network traffic
- computer systems
- intrusion detection system
- network management
- communication networks
- network monitoring
- pattern recognition
- intrusion detection
- data mining
- tcp ip
- information systems
- secret sharing scheme
- real time
- security problems
- computer networking
- computer network security