-
1
-
2
-
3
-
4
Securing ad hoc networks.
Опубликовано в: IEEE Network : the magazine of global information exchangeСтатья -
5
-
6