Login / Signup
Resilient security system by deploying dynamic crypto-architectures.
Wael Adi
Published in:
ICUMT (2011)
Keyphrases
</>
information security
security protocols
dynamic environments
intrusion detection
access control
power consumption
security issues
security requirements
security mechanisms
key management
security threats
security vulnerabilities