Applying symmetric and asymmetric key algorithms for the security in wireless networks

Author(s):  
Azzedine Boukerche ◽  
Yonglin Ren ◽  
Lynda Mokdad
Keyword(s):  
Author(s):  
Zhu Han ◽  
Husheng Li ◽  
Wotao Yin

Sign in / Sign up

Export Citation Format

Share Document