Login / Signup
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks.
Katrin Hoeper
Guang Gong
Published in:
Int. J. Secur. Networks (2007)
Keyphrases
</>
data sets
genetic algorithm
information systems
multiscale
wireless sensor networks
third party
service discovery
key management
database transactions
qos routing