Applying network address encryption to anonymity and preventing data exfiltration.
Autor: | Trostle, J. |
---|---|
Zdroj: | MILCOM 2008 - 2008 IEEE Military Communications Conference; 2008, p1-7, 7p |
Databáze: | Complementary Index |
Externí odkaz: |
Autor: | Trostle, J. |
---|---|
Zdroj: | MILCOM 2008 - 2008 IEEE Military Communications Conference; 2008, p1-7, 7p |
Databáze: | Complementary Index |
Externí odkaz: |