Login / Signup
A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback.
Yvo Desmedt
Yongge Wang
Mike Burmester
Published in:
ISAAC (2005)
Keyphrases
</>
wireless sensor networks
database
information retrieval
genetic algorithm
e learning
website
web services
user interaction
intrusion detection
feedback mechanisms