Login / Signup
Analysis of security protocols based on challenge-response.
Junzhou Luo
Ming Yang
Published in:
Sci. China Ser. F Inf. Sci. (2007)
Keyphrases
</>
security protocols
real time
data analysis
databases
sensor networks
anomaly detection