Accelerating application-level security protocols.
Matthew BurnsideAngelos D. KeromytisPublished in: ICON (2003)
Keyphrases
- application level
- security protocols
- operating system
- security mechanisms
- automated design
- quality of service
- security services
- network management
- artificial immune algorithm
- virtual machine
- security properties
- bottle neck
- overlay network
- key management
- security requirements
- access control
- real time
- response time
- sensor networks
- database systems