Login / Signup

ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I).

Levent ErtaulWeimin Lu
Published in: NETWORKING (2005)
Keyphrases
  • key exchange
  • security analysis
  • data sources
  • data distribution
  • security requirements
  • sensitive data