Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security.
Shahrulniza MusaAamir ShahzadAbdulaziz AborujilahPublished in: ICUIMC (2013)
Keyphrases
- end to end
- application layer
- security model
- security services
- security mechanisms
- security requirements
- security protocols
- network layer
- key management
- physical layer
- security analysis
- access control
- multipath
- security issues
- public key
- ddos attacks
- computer systems
- ad hoc networks
- video sequences
- information security
- cross layer