Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference49 articles.
1. Sureshkumar V, Amin R, Obaidat MS, Karthikeyan I (2020) An enhanced mutual authentication and key establishment protocol for tmis using chaotic map. Journal of Information Security and Applications 53:102,539
2. Galindo D, Roman R, Lopez J (2008) In: International Conference on Cryptology and Network Security (Springer), pp 120–132
3. Cong Y, Yang G, Wei Z, Zhou W (2010) In: 2010 International Conference on Communications and Mobile Computing, vol 1 (IEEE), pp 162–168
4. Domingo MC (2011) Securing underwater wireless communication networks. IEEE Wireless Communications 18(1):22–28
5. Lloret J (2013) Underwater sensor nodes and networks