Login / Signup

Signal-flow-based analysis of wireless security protocols.

Cagatay CaparDennis GoeckelKenneth G. PatersonElizabeth A. QuagliaDon TowsleyMurtaza Zafer
Published in: Inf. Comput. (2013)
Keyphrases
  • security protocols
  • real time
  • data mining
  • database systems
  • mobile devices
  • query processing
  • response time
  • wireless networks
  • high frequency
  • software architecture
  • power consumption