Login / Signup
An EAP-EHash authentication method adapted to resource constrained terminals.
Omar Cheikhrouhou
Maryline Laurent
Amin Ben Abdallah
Maher Ben Jemaa
Published in:
Ann. des Télécommunications (2010)
Keyphrases
</>
resource constrained
cost function
objective function
computational complexity
low cost
shortest path