Sign in

Two-tier authentication for cluster and individual sets in mobile ad hoc networks.

Yuh-Ren TsaiShiuh-Jeng Wang
Published in: Comput. Networks (2007)
Keyphrases
  • database
  • data clustering
  • clustering algorithm
  • real time
  • database systems
  • high dimensional
  • data objects
  • security analysis
  • authentication scheme