Login / Signup

Redundant Schemes or How to Counter the Delay Attack on Time Synchronization Protocols.

Johannes NeyerLukas GassnerCristian Marinescu
Published in: ISPCS (2019)
Keyphrases
  • authentication protocol
  • communication protocol
  • neural network
  • security analysis
  • communication protocols
  • highly redundant