2
Views
0
CrossRef citations to date
0
Altmetric
Miscellany

Improved Cross Authentication Model Based on Threshold Method in Wireless Network

&
Page 86 | Published online: 28 Jan 2009

Reference

  • Ya-tao , Yang , Ping , Zeng and Yong , Fang . 2007 . “ A feasible key management scheme in adhoc network[C] ” . In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing , 300 – 303 . Qingdao, , China : IEEE CS Press . 7

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.