A note on the security of MST3.
María Isabel González VascoAngel L. Pérez del PozoPedro Taborda DuartePublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- access control
- information security
- intrusion detection
- security systems
- security policies
- security requirements
- minimum spanning tree
- network security
- functional requirements
- security issues
- statistical databases
- security analysis
- security mechanisms
- information assurance
- case study
- security level
- security management
- security problems
- minimal spanning tree
- database
- key management
- rfid tags
- network management
- neural network