Login / Signup

Improvements on the WTLS protocol to avoid denial of service attacks.

Ruishan ZhangKefei Chen
Published in: Comput. Secur. (2005)
Keyphrases
  • denial of service attacks
  • dos attacks
  • intrusion detection system
  • security threats
  • end hosts
  • ddos attacks
  • intrusion detection
  • distributed systems
  • network security
  • databases