Login / Signup

Network Security Analysis Using Behavior History Graph.

Mirko SailioMatti MantereSami Noponen
Published in: ARES (2014)
Keyphrases
  • security analysis
  • high security
  • security requirements
  • public key
  • authentication protocol
  • databases
  • wireless sensor networks
  • peer to peer
  • authentication scheme
  • encryption scheme