Login / Signup

Analysis of security protocols based on challenge-response.

Junzhou LuoMing Yang
Published in: Sci. China Ser. F Inf. Sci. (2007)
Keyphrases
  • security protocols
  • real time
  • data analysis
  • databases
  • sensor networks
  • anomaly detection