@dblp

Authentication in a layered security approach for mobile ad hoc networks.

, , and . Comput. Secur., 26 (5): 373-380 (2007)

Links and resources

Tags