Sciweavers

5631 search results - page 1127 / 1127
» Network Behavior Analysis Based on a Computer Network Model
Sort
View
TMC
2012
11 years 7 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
« Prev « First page 1127 / 1127 Last » Next »