Login / Signup

Applying protocol analysis to security device interfaces.

Jonathan Herzog
Published in: IEEE Secur. Priv. (2006)
Keyphrases
  • data analysis
  • user interface
  • cryptographic protocols
  • lightweight
  • intrusion detection
  • risk analysis
  • communication protocols