Login / Signup
Cryptanalysis of some user identification schemes for distributed computer networks.
Yu-Chi Chen
Chao-Liang Liu
Gwoboa Horng
Published in:
Int. J. Commun. Syst. (2014)
Keyphrases
</>
computer networks
network security
intrusion detection system
network traffic
computer systems
communication networks
network management
user interface
user interaction
security problems
end users
network monitoring
deadlock detection
tcp ip
network nodes
principal component analysis