Login / Signup
Signal-flow-based analysis of wireless security protocols.
Cagatay Capar
Dennis Goeckel
Kenneth G. Paterson
Elizabeth A. Quaglia
Don Towsley
Murtaza Zafer
Published in:
Inf. Comput. (2013)
Keyphrases
</>
security protocols
real time
data mining
database systems
mobile devices
query processing
response time
wireless networks
high frequency
software architecture
power consumption