Security mechanisms in a transport layer protocol.
Victor L. VoydockStephen T. KentPublished in: Comput. Secur. (1985)
Keyphrases
- transport layer
- security mechanisms
- end to end
- application layer
- network layer
- resource constrained
- access control
- security issues
- physical layer
- security protocols
- smart card
- cross layer
- security requirements
- operating system
- network monitoring
- network congestion
- multipath
- computer networks
- internet protocol
- ip address
- transport protocol
- rfid tags
- information security
- information systems
- smart grid
- ddos attacks
- communication protocol
- video streaming
- security policies
- network architecture
- wireless communication
- routing protocol
- anomaly detection
- real time