Sign in

Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN).

Albena MihovskaNeeli R. Prasad
Published in: MobiQuitous (2007)
Keyphrases
  • databases
  • security architecture
  • computer networks
  • data mining
  • information systems