C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Enriching network security analysis with time travel.
Gregor Maier
Robin Sommer
Holger Dreger
Anja Feldmann
Vern Paxson
Fabian Schneider
Published in:
SIGCOMM (2008)
Keyphrases
</>
security analysis
smart card
security model
public key
security requirements
high security
databases
security properties
image encryption
peer to peer
computer networks
encryption scheme
proxy signature scheme