Security Extensions to MMARP Through Cryptographically Generated Addresses.
Francisco J. GaleraPedro M. RuizAntonio Fernandez Gómez-SkarmetaAndreas KasslerPublished in: GI Jahrestagung (2) (2005)
Keyphrases
- network security
- randomly selected
- security requirements
- security systems
- security issues
- access control
- intrusion detection
- statistical databases
- databases
- security analysis
- generation process
- functional requirements
- information security
- database
- security policies
- information systems
- key management
- computer security
- genetic algorithm
- data security
- security problems
- security management