Login / Signup
Applying protocol analysis to security device interfaces.
Jonathan Herzog
Published in:
IEEE Secur. Priv. (2006)
Keyphrases
</>
data analysis
user interface
cryptographic protocols
lightweight
intrusion detection
risk analysis
communication protocols