Applying network address encryption to anonymity and preventing data exfiltration.

Autor: Trostle, J.
Zdroj: MILCOM 2008 - 2008 IEEE Military Communications Conference; 2008, p1-7, 7p
Databáze: Complementary Index