Login / Signup
Redundant Schemes or How to Counter the Delay Attack on Time Synchronization Protocols.
Johannes Neyer
Lukas Gassner
Cristian Marinescu
Published in:
ISPCS (2019)
Keyphrases
</>
authentication protocol
communication protocol
neural network
security analysis
communication protocols
highly redundant