Wireless security by handling computations
Abstract
Research on security in the domain of wireless has an active area. Wireless security study uses cryptographic tools. The major problem with these tolls, they based on computational assumptions, which may not be usable in the future.
Keywords
Wireless security; handling computation
Full Text:
PDFCopyright (c) 2015 Sachin G. Chawhan, M. B. Chandak, Gurudev Sawarkar
![Creative Commons License](http://licensebuttons.net/l/by-nc-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org