-
1
Modeling the interrupt transmission process of SR-IOV cryptographic device
Published 2019-02-01Subjects: Get full text
Article -
2
Password authentication scheme for mobile computing environment
Published 2007-01-01Subjects: Get full text
Article -
3
Characterizing the topology dynamics in mobile ad hoc networks:modeling and analyzing techniques using the queuing theory
Published 2011-01-01Subjects: Get full text
Article