Login / Signup
Security analysis of the IEEE 802.15.6 standard.
Mohsen Toorani
Published in:
Int. J. Commun. Syst. (2016)
Keyphrases
</>
security analysis
smart card
security requirements
public key
security model
high security
encryption scheme
security properties
user authentication
proxy signature scheme
databases
encryption algorithm
database systems