- A backpressure technique for filtering spoofed traffic at upstream routers
- Authentication and secret search mechanisms for RFID-aware wireless sensor networks
- An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
- Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
- Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
- Lightweight authentication protocol for mobile RFID networks
- A cross-layer authentication design for secure video transportation in wireless sensor network
1 January 2010
Special issue: Security, privacy, and identification technologies in wireless sensor networks
International Journal of Security and Networks 5(1) 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment