Login / Signup
Preventing unauthorized access in information centric networking.
Eslam G. AbdAllah
Mohammad Zulkernine
Hossam S. Hassanein
Published in:
Secur. Priv. (2018)
Keyphrases
</>
management system
unauthorized access
data sets
information systems
access control