Login / Signup
A Cryptographic Approach to Defend against IP Spoofing.
Mangalam Ravi
S. Narasimman
G. K. Arun Kumar
D. Karthikeyan
Published in:
BAIP (2010)
Keyphrases
</>
smart card
hash functions
key management
encryption key
security protocols
wireless access networks
neural network
case study
feature extraction
digital signature
s box
ip address
packet filtering
data encryption standard