Login / Signup

Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness.

Azzedine BoukercheYonglin RenLynda Mokdad
Published in: Q2SWinet (2010)
Keyphrases
  • wireless networks
  • computational complexity
  • wireless communication
  • ad hoc networks
  • cellular networks
  • wireless transmission
  • mobile computing
  • multi hop
  • multimedia services