Login / Signup

Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks.

Katrin HoeperGuang Gong
Published in: Int. J. Secur. Networks (2007)
Keyphrases
  • data sets
  • genetic algorithm
  • information systems
  • multiscale
  • wireless sensor networks
  • third party
  • service discovery
  • key management
  • database transactions
  • qos routing