Login / Signup

Is that you? Authentication in a network without identities.

Taehwan ChoiHrishikesh B. AcharyaMohamed G. Gouda
Published in: Int. J. Secur. Networks (2011)
Keyphrases
  • computer networks
  • network model
  • real time
  • network structure
  • communication networks
  • network design
  • authentication scheme
  • peer to peer
  • complex networks
  • virtual private network