Login / Signup

Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials.

Willem BurgersRoel VerdultMarko C. J. D. van Eekelen
Published in: NordSec (2013)
Keyphrases
  • network model
  • wireless sensor networks
  • complex networks
  • computer networks
  • peer to peer
  • neural network
  • learning algorithm
  • wireless networks
  • cellular automata
  • network structure