Login / Signup
Internal Corporative Security: Protocols Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic in the Domain of Gaussian Integers.
Boris S. Verkhovsky
Roberto D. Rubino
Published in:
SEDE (2009)
Keyphrases
</>
sensitive information
network traffic
security protocols
third party
privacy preserving
information leakage
intrusion detection
anomaly detection
sensitive data
computer networks
original data
network security
intrusion detection system
network intrusion detection
routing algorithm
security requirements