Login / Signup
Secure candidate access router discovery.
Eunsoo Shim
Eunsoo Redlich
Richard D. Gitlin
Published in:
WCNC (2003)
Keyphrases
</>
password authentication
access control
data mining
knowledge discovery
lightweight
security requirements
security level
databases
neural network
end to end
candidate set
authentication scheme
data encryption