×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [attack model]
Secure information aggregation in sensor networks
1.150 views
slides
483 views
Slides for lecture 26
351 views
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection
213 views
Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman, Nathan Keller, and Adi Shamir Haifa University, Bar-Ilan University, and The
216 views
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung
216 views
TRUST MODEL FOR AD HOC NETWORKS
38 views
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies
82.714 views
Design and Analysis of the Secure Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security BBN Technologies A Part of
215 views
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz
215 views
Confidentiality-preserving Proof Theories for Distributed Proof Systems Kazuhiro Minami National Institute of Informatics FAIS 2011
222 views
Confidentiality-preserving Proof Theories for Distributed Proof Systems
25 views
Next >