Login / Signup

A comparison of two approaches for achieving flexible and adaptive security middleware.

Tom GoovaertsBart De WinWouter Joosen
Published in: Middleware Security (2008)
Keyphrases
  • network security
  • strengths and weaknesses
  • real time
  • data sets
  • wireless sensor networks
  • functional requirements
  • adaptive algorithms