default search action
"An Efficient Protocol for Privacy and Authentication for ..."
Clifton J. Mulkey, Dulal C. Kar, Ajay K. Katangur (2013)
- Clifton J. Mulkey, Dulal C. Kar, Ajay K. Katangur:
An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks. Int. J. Cyber Warf. Terror. 3(2): 38-57 (2013)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.