Login / Signup

Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.

Ding WangPing Wang
Published in: Ad Hoc Networks (2014)
Keyphrases