Security Mechanisms in High-Level Network Protocols.
Victor L. VoydockStephen T. KentPublished in: ACM Comput. Surv. (1983)
Keyphrases
- network protocols
- security mechanisms
- high level
- resource constrained
- security issues
- smart card
- access control
- smart grid
- operating system
- security requirements
- wireless mesh networks
- security protocols
- resource constraints
- wireless sensor networks
- information security
- communication networks
- rfid tags
- artificial intelligence