Login / Signup

A Novel Trusted Computing Model for Network Security Authentication.

Ling XingLing JiangGuohai YangBin Wen
Published in: J. Networks (2014)
Keyphrases
  • network security
  • information systems
  • metadata
  • computer systems
  • intrusion detection
  • risk assessment
  • traffic analysis