Login / Signup
A comparison of two approaches for achieving flexible and adaptive security middleware.
Tom Goovaerts
Bart De Win
Wouter Joosen
Published in:
Middleware Security (2008)
Keyphrases
</>
network security
strengths and weaknesses
real time
data sets
wireless sensor networks
functional requirements
adaptive algorithms