Search Results - dynamic encryption and authentication

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Source: International Journal Of Engineering And Management Research 13(3):184-188. 2023

  15. 15
  16. 16

    Authors: Shuo Chen Maode Ma

    Source: 2013 IEEE Global Communications Conference (GLOBECOM); 2013, p2897-2901, 5p

  17. 17
  18. 18
  19. 19
  20. 20