Search
Now showing items 1-1 of 1
Roaming Authentication and End-to-End Authentication in Wireless Security
(2008-09-09)
With the rapid development of wireless networks, researchers, practitioners, and end users are paying closer attention to the security issues in mobile computing. Authentication is the imperative step to establish security ...