Login / Signup
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
John Kelsey
Bruce Schneier
Published in:
Recent Advances in Intrusion Detection (1999)
Keyphrases
</>
remote access
earth science data
intrusion detection
log data
data mining techniques
remote laboratories
response time
low cost
intrusion detection system
video streaming