Login / Signup
Security Analysis of Compromised-Neighbor-Tolerant Networks Using Stochastics.
Xiaohu Li
Linxiong Li
Published in:
IEEE Trans. Reliab. (2012)
Keyphrases
</>
security analysis
smart card
security requirements
public key
high security
security properties
nearest neighbor
proxy signature scheme
image encryption
security model
encryption scheme
encryption algorithm
user authentication
authentication protocol
mutual authentication
privacy preserving
databases