Login / Signup
Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion).
Petr Svenda
Published in:
Security Protocols Workshop (2016)
Keyphrases
</>
ad hoc networks
network topology
wireless ad hoc networks
wireless networks
routing protocol
quality of service
end to end
routing algorithm
real time
mobile ad hoc networks
key management
limited bandwidth