Wireless security by handling computations

Sachin G. Chawhan, M. B. Chandak, Gurudev Sawarkar

Abstract


Research on security in the domain of wireless has an active area. Wireless security study uses cryptographic tools. The major problem with these tolls, they based on computational assumptions, which may not be usable in the future.

Keywords


Wireless security; handling computation

Full Text:

PDF




Copyright (c) 2015 Sachin G. Chawhan, M. B. Chandak, Gurudev Sawarkar

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org