Login / Signup

An implementation-independent threat model for group communications.

Jason HesterWilliam YurcikRoy H. Campbell
Published in: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2006)
Keyphrases