Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services

Logic Journal of the IGPL 24 (4) (2016)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 100,448

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
Adaptive Depth-Based Routing Protocol for Energy-Constrained Underwater Wireless Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):635-640.
Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
Causation and conditionals.Ernest Sosa (ed.) - 1975 - New York: Oxford University Press.

Analytics

Added to PP
2016-06-30

Downloads
35 (#636,908)

6 months
5 (#1,013,651)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references