Login / Signup

A proof technique for security assessment of on-demand ad hoc routing protocols.

István Vajda
Published in: Int. J. Secur. Networks (2014)
Keyphrases