Hi everybody,

Has someone simulated a key management in wireless ad-hoc network?

Could you send me the source or guidelines to  do it?

Thanks in adv.


Best,

Fanian.

Reply via email to