Sign in

Protocols for Malicious Host Revocation.

Oscar EsparzaMiguel SorianoJose L. MuñozJordi Forné
Published in: ICICS (2003)
Keyphrases
  • key distribution
  • access control
  • trusted third party
  • malicious behavior
  • malicious attacks
  • detect malicious
  • communication protocols
  • neural network
  • email
  • key management
  • application level