Punishing Malicious Hosts with the Cryptographic Traces Approach.
Oscar EsparzaJose L. MuñozMiguel SorianoJordi FornéPublished in: New Gener. Comput. (2006)
Keyphrases
- smart card
- mobile agents
- ip addresses
- security protocols
- neural network
- malicious behavior
- execution traces
- secure communication
- cryptographic protocols
- key management
- detect malicious
- database
- malicious attacks
- s box
- encryption scheme
- hash functions
- social networks
- artificial intelligence
- digital signature
- pre determined
- network traffic
- information systems
- malicious code
- random number generator
- databases