Login / Signup
Secure the commodity applications against address exposure attacks.
Xiaoguang Wang
Yong Qi
Published in:
ISCC (2017)
Keyphrases
</>
security mechanisms
secure routing
cryptographic protocols
security protocols
stream cipher
chosen plaintext
lightweight
malicious attacks
countermeasures
security issues
standard model
unauthorized access
insider attacks
remote user authentication scheme