Back to Results
First PageMeta Content



How to bootstrap security for ad-hoc network: Revisited Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka Abstract There are various network-enabled and embedded computers deployed
Add to Reading List

Document Date: 2011-03-30 10:36:01


Open Document

File Size: 345,44 KB

Share Result on Facebook