Login / Signup

Development in Authentication of AODV Protocols to Resist the Attacks.

Ahmad Alomari
Published in: ICIST (2013)
Keyphrases
  • authentication protocol
  • key distribution
  • semi fragile watermarking
  • response time
  • security mechanisms
  • security protocols
  • cryptographic protocols