Login / Signup
Authentication of Concast Communication.
Mohamed Al-Ibrahim
Hossein Ghodosi
Josef Pieprzyk
Published in:
INDOCRYPT (2002)
Keyphrases
</>
communication systems
communication networks
communication overhead
secure communication
neural network
case study
information sharing
communication cost
security analysis
communication patterns
database
multi agent systems
human computer
biometric authentication