Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
Katrin Hoeper, Guang Gong
International Journal of Security and Networks (IJSN), 2007 Vol.2 No.3/4, pp.239 - 250
15 + 2 =

Thank you for your feedback.