Login / Signup

Providing Tunable Security Services: An IEEE 802.11i Example.

Stefan LindskogAnna BrunströmZoltán FaiglKatalin Toth
Published in: SecureComm (2006)
Keyphrases
  • security services
  • security protocols
  • personal information
  • security mechanisms
  • key management
  • authentication mechanism
  • government services
  • response time
  • digital libraries
  • low cost