Login / Signup

An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms.

Kristof TeichelDieter SiboldStefan Milius
Published in: ICISS (2016)
Keyphrases
  • defense mechanisms
  • authentication protocol
  • information security
  • countermeasures
  • database
  • neural network
  • data mining
  • multi agent
  • building blocks
  • wireless networks
  • secret key
  • security services
  • key exchange protocol