On the usability and security of pseudo-signatures.
Jin ChenDaniel P. LoprestiPublished in: DRR (2010)
Keyphrases
- intrusion detection
- information security
- security issues
- information assurance
- computer security
- security measures
- statistical databases
- security requirements
- security threats
- security policies
- information systems
- security management
- cryptographic protocols
- security systems
- cyber security
- network security
- security model
- security level
- security analysis
- security properties
- operating system
- network traffic
- network management
- security vulnerabilities