1 Questions 12 Answers 0 Followers
Questions related from Mohamed Amine Ferrag
We have proposed security schemes that use asymmetric ciphers / symmetric ciphers for some types of wireless networks. To determine the amount of overhead that a security protocol can introduce in...
10 October 2014 8,417 5 View