Login / Signup
Extensions to an authentication technique proposed for the global mobility network.
Levente Buttyán
Constant Gbaguidi
Sebastian Staamann
Uwe G. Wilhelm
Published in:
IEEE Trans. Commun. (2000)
Keyphrases
</>
global information
network configuration
neural network
ns simulator
wireless sensor networks
mobile ip
virtual private network
peer to peer
intrusion detection
mobile agents
complex networks
computer networks
network architecture
trust relationships