Login / Signup

Making DTNs robust against spoofing attacks with localized countermeasures.

Md. Yusuf Sarwar UddinAhmed KhurshidHee Dong JungCarl A. GunterMatthew CaesarTarek F. Abdelzaher
Published in: SECON (2011)
Keyphrases
  • countermeasures
  • information security
  • power analysis
  • java card
  • security measures
  • cyber attacks
  • databases