Release Time:2018-05-04 Hits:
Indexed by: Journal Papers
Date of Publication: 2018-05-08
Journal: Computational & Mathematical Organization Theory
Included Journals: SCI
Prev One:On the using of Renyis quadratic entropy for physical layer key generation
Next One:A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs