Login / Signup

Optimized in-network authentication against pollution attacks in software-defined-named data networking.

Ryma BoussahaYacine ChallalAbdelmadjid BouabdallahMalika Bessedik
Published in: J. Inf. Secur. Appl. (2020)
Keyphrases
  • data sets
  • data analysis
  • computer systems
  • network structure
  • data processing
  • data transfer
  • data sources
  • software development
  • access control
  • monitoring system
  • network traffic
  • network resources
  • digital watermarking