2022
DOI: 10.1007/s13198-022-01820-0
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced security using proxy signcryption technique for wireless mesh networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…As a result, bandwidth may be used more effectively because the burden is shared among a number of viewers rather than being concentrated on a single server. A comparison chart for three well-liked P2P live streaming protocols can be seen below [38,39]:…”
Section: Peer-to-peer (P2p) Live Streamingmentioning
confidence: 99%
“…As a result, bandwidth may be used more effectively because the burden is shared among a number of viewers rather than being concentrated on a single server. A comparison chart for three well-liked P2P live streaming protocols can be seen below [38,39]:…”
Section: Peer-to-peer (P2p) Live Streamingmentioning
confidence: 99%