Login / Signup

Preventing unauthorized access in information centric networking.

Eslam G. AbdAllahMohammad ZulkernineHossam S. Hassanein
Published in: Secur. Priv. (2018)
Keyphrases
  • management system
  • unauthorized access
  • data sets
  • information systems
  • access control