Login / Signup
New Techniques to Enhance the Capabilities of the Socks Network Security Protocol.
Mukund Sundararajan
Mohammad S. Obaidat
Published in:
SECRYPT (2008)
Keyphrases
</>
security protocols
peer to peer
wireless sensor networks
wireless mesh networks
key management
real time
information systems
computer networks
rfid tags
security services
cryptographic algorithms