Results 161 to 161 of about 1,501 (161)
Some of the next articles are maybe not open access.
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012