Browsing by Subject "Protocol"
Now showing items 1-1 of 1
-
(2012-02-14)Data integrity and privacy are the two most important security requirements in wireless communication. Most mechanisms rely on pre-share key data encryption to prevent unauthorized users from accessing confidential ...