• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Enriching network security analysis with time travel.

Gregor MaierRobin SommerHolger DregerAnja FeldmannVern PaxsonFabian Schneider
Published in: SIGCOMM (2008)
Keyphrases
  • security analysis
  • smart card
  • security model
  • public key
  • security requirements
  • high security
  • databases
  • security properties
  • image encryption
  • peer to peer
  • computer networks
  • encryption scheme
  • proxy signature scheme