Login / Signup
Security analysis of forwarding strategies in network time measurements using Openflow.
Alex M. S. Orozco
Charles V. Neu
Regio A. Michelin
Avelino F. Zorzo
Published in:
ICITST (2016)
Keyphrases
</>
security analysis
public key
computer networks
image encryption
smart card
security requirements
encryption scheme
wireless sensor networks
traffic engineering
high security
peer to peer
information systems
network traffic
user authentication
security properties