Amanote Research
Register
Sign In
Optimal Scalable Security Architectures in the Presence of Colluding Mobile Traitors
doi 10.1109/etwcs.1999.897336
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
R. Poovendran
J.S. Baras
Publisher
IEEE
Related search
Behavior Forensics in Traitors Within Traitors for Scalable Multimedia
Requirements for Scalable Access Control and Security Management Architectures
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services
Wireless Communications and Mobile Computing
Computer Networks
Electronic Engineering
Information Systems
Electrical
Communications
Parallel Logic Programming Systems on Scalable Architectures
Journal of Parallel and Distributed Computing
Computer Networks
Hardware
Communications
Architecture
Theoretical Computer Science
Artificial Intelligence
Software
Security Architectures Using Formal Methods
IEEE Journal on Selected Areas in Communications
Computer Networks
Electronic Engineering
Electrical
Communications
Mobile Application (In)security
Colluding Through Suppliers
SSRN Electronic Journal
Mobile Ambients in Aspect-Oriented Software Architectures
Towards Scalable Optimal Traffic Control