Login / Signup
Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing.
Sandip Vijay
Subhash C. Sharma
Published in:
IC3 (2009)
Keyphrases
</>
cellular automata
wireless local area network
wireless communication
classification scheme
detection scheme
computer simulation
wireless networks
information security
data sets
neural network
mobile devices
access points
cross layer
public key cryptography