Login / Signup
Automating the security analysis process of secure ad hoc routing protocols.
Todd R. Andel
G. Back
Alec Yasinsac
Published in:
Simul. Model. Pract. Theory (2011)
Keyphrases
</>
security analysis
routing protocol
security requirements
public key
ad hoc networks
authentication scheme
smart card
security properties
information systems
wireless sensor networks
sensor networks
routing algorithm
encryption scheme
secure routing