Login / Signup
The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks.
Enock Chisonge Mofya
Jonathan Cole Smith
Published in:
ISI (2004)
Keyphrases
</>
communication networks
wireless communication
computer networks
distributed databases
network design
ip networks
watermarking scheme
communication protocols
database
databases
case study
data analysis
smart card
stack filters
email communication