Login / Signup
TrueIP: prevention of IP spoofing attacks using identity-based cryptography.
Christian Schridde
Matthew Smith
Bernd Freisleben
Published in:
SIN (2009)
Keyphrases
</>
identity based cryptography
key management
security protocols
ddos attacks
ad hoc networks
watermarking scheme
key distribution
database systems
digital signature
bilinear pairings
response time
security mechanisms
provably secure