Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Communications of the ACM
Overview of IEEE 802.16 Security
IEEE Security and Privacy
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Security issues in privacy and key management protocols of IEEE 802.16
Proceedings of the 44th annual Southeast regional conference
Security of IEEE 802.16 in mesh mode
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Hi-index | 0.00 |
Network coding has been shown to be an effective approach to achieve the maximum capacity of multicast networks. In previous works, we proposed a classic queueing model for encoding nodes to investigate the operations of the encoding process. We found ...