Login / Signup
Enriching network security analysis with time travel.
Gregor Maier
Robin Sommer
Holger Dreger
Anja Feldmann
Vern Paxson
Fabian Schneider
Published in:
SIGCOMM (2008)
Keyphrases
</>
security analysis
smart card
security model
public key
security requirements
high security
databases
security properties
image encryption
peer to peer
computer networks
encryption scheme
proxy signature scheme