Login / Signup
Is that you? Authentication in a network without identities.
Taehwan Choi
Hrishikesh B. Acharya
Mohamed G. Gouda
Published in:
Int. J. Secur. Networks (2011)
Keyphrases
</>
computer networks
network model
real time
network structure
communication networks
network design
authentication scheme
peer to peer
complex networks
virtual private network