Login / Signup
Development in Authentication of AODV Protocols to Resist the Attacks.
Ahmad Alomari
Published in:
ICIST (2013)
Keyphrases
</>
authentication protocol
key distribution
semi fragile watermarking
response time
security mechanisms
security protocols
cryptographic protocols