"Mitigating Eavesdropping Attack Using Secure Key Management Scheme in ..."

Farah I. Kandah, Yashaswi Singh, Weiyi Zhang (2012)

Details and statistics

DOI: 10.4304/JCM.7.8.596-605

access: closed

type: Journal Article

metadata version: 2024-04-02

a service of  Schloss Dagstuhl - Leibniz Center for Informatics