Login / Signup
An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms.
Kristof Teichel
Dieter Sibold
Stefan Milius
Published in:
ICISS (2016)
Keyphrases
</>
defense mechanisms
authentication protocol
information security
countermeasures
database
neural network
data mining
multi agent
building blocks
wireless networks
secret key
security services
key exchange protocol