Security for Multi-hop Wireless NetworksSystem Model
Security for Multi-hop Wireless Networks: System Model
Mahmoud, Mohamed M. E. A.; Shen, Xuemin (Sherman)
2014-01-27 00:00:00
[In this chapter, we discuss the system model including the network and communication models and the threat and trust models]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/security-for-multi-hop-wireless-networks-system-model-j97Z6fm0s2
Security for Multi-hop Wireless NetworksSystem Model
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.