Login / Signup

An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks.

Clifton J. MulkeyDulal C. KarAjay K. Katangur
Published in: Int. J. Cyber Warf. Terror. (2013)
Keyphrases