Login / Signup
Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect.
Josef von Helden
Ingo Bente
Published in:
ISSE (2008)
Keyphrases
</>
access control
trust relationships
wireless sensor networks
computer networks
peer to peer
network traffic
fine grained
data security
security model