Sign in

Practical Secure Logging: Seekable Sequential Key Generators.

Giorgia Azzurra MarsonBertram Poettering
Published in: ESORICS (2013)
Keyphrases
  • secure communication
  • real world
  • wireless sensor networks
  • high security
  • neural network
  • information systems
  • key technologies
  • security issues
  • identity management
  • key exchange