Authentication in Ad Hoc Networks for Information Warfare

碩士 === 國防管理學院 === 國防資訊研究所 === 94 === Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each...

Full description

Bibliographic Details
Main Authors: WANG JHIH PENG, 王智鵬
Other Authors: 伍台國
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/67960310304829071960