

Author: Smith Jason Tritilanunt Suratose Boyd Colin Nieto Juan M. Gonzalez Foo Ernest
Publisher: Inderscience Publishers
ISSN: 1741-1084
Source: International Journal of Wireless and Mobile Computing, Vol.2, Iss.1, 2007-05, pp. : 59-71
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






Securing wireless mobile nodes from distributed denial‐of‐service attacks
CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol. 1532-0626, Iss. 15, 2015-10 ,pp. :

