Login / Signup
Two-tier authentication for cluster and individual sets in mobile ad hoc networks.
Yuh-Ren Tsai
Shiuh-Jeng Wang
Published in:
Comput. Networks (2007)
Keyphrases
</>
database
data clustering
clustering algorithm
real time
database systems
high dimensional
data objects
security analysis
authentication scheme