Login / Signup
In Vivo Evaluation of the Secure Opportunistic Schemes Middleware using a Delay Tolerant Social Network.
Corey E. Baker
Allen Starke
Tanisha G. Hill-Jarrett
Janise McNair
Published in:
CoRR (2017)
Keyphrases
</>
social networks
delay tolerant
network structure
security issues
location aware