Login / Signup

An overlay approach to data security in ad-hoc networks.

Jörg LiebeherrGuangyu Dong
Published in: Ad Hoc Networks (2007)
Keyphrases