Login / Signup

Authenticated resource management in delay-tolerant networks using proxy signatures.

Dominik SchürmannJörg OttLars C. Wolf
Published in: WONS (2013)
Keyphrases