Login / Signup
Enforcing End-to-End Security in Scada Systems via Application-Level Cryptography.
Adrian-Vasile Duka
Béla Genge
Piroska Haller
Bogdan Crainicu
Published in:
Critical Infrastructure Protection (2017)
Keyphrases
</>
end to end
application level
network management
network services
operating system
quality of service
information security
virtual machine
ad hoc networks
critical infrastructure
admission control
congestion control
bottle neck
overlay network
security policies
computer systems