Login / Signup

The Secure Boston Mechanism.

Umut Mert DurRobert HammondThayer Morrill
Published in: EAI Endorsed Trans. Security Safety (2016)
Keyphrases
  • mobile agent system
  • computational model
  • security analysis
  • databases
  • neural network
  • real world
  • data mining
  • information systems
  • key management
  • authentication mechanism