Sign in

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.

Debiao HeSherali ZeadallyLibing WuHuaqun Wang
Published in: Comput. Networks (2017)
Keyphrases