Login / Signup
Utilizing the Messaging Layer Security Protocol in a Lossy Communications Aerial Swarm.
Elyssa Dietz
Duane Davis
Britta Hale
Published in:
HICSS (2023)
Keyphrases
</>
security protocols
security services
artificial immune algorithm
swarm intelligence
automated design
particle swarm optimization
security mechanisms
cryptographic algorithms
data compression
key management
message delivery
rfid tags
authentication protocol
group communication
rfid systems
application layer