Login / Signup

A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback.

Yvo DesmedtYongge WangMike Burmester
Published in: ISAAC (2005)
Keyphrases
  • wireless sensor networks
  • database
  • information retrieval
  • genetic algorithm
  • e learning
  • website
  • web services
  • user interaction
  • intrusion detection
  • feedback mechanisms