Login / Signup
Cryptographic techniques for mobile ad-hoc networks.
Vanesa Daza
Javier Herranz
Paz Morillo
Carla Ràfols
Published in:
Comput. Networks (2007)
Keyphrases
</>
smart card
security protocols
cryptographic protocols
digital signature
hash functions
differential power analysis
data sets
galois field
cryptographic algorithms
key management
encryption scheme
multiscale
three dimensional
image segmentation
case study
information systems
machine learning