Login / Signup
Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness.
Azzedine Boukerche
Yonglin Ren
Lynda Mokdad
Published in:
Q2SWinet (2010)
Keyphrases
</>
wireless networks
computational complexity
wireless communication
ad hoc networks
cellular networks
wireless transmission
mobile computing
multi hop
multimedia services