Login / Signup
Providing Tunable Security Services: An IEEE 802.11i Example.
Stefan Lindskog
Anna Brunström
Zoltán Faigl
Katalin Toth
Published in:
SecureComm (2006)
Keyphrases
</>
security services
security protocols
personal information
security mechanisms
key management
authentication mechanism
government services
response time
digital libraries
low cost