Special issue: Security, privacy, and identification technologies in wireless sensor networks
International Journal of Security and Networks 5(1) 2010- A backpressure technique for filtering spoofed traffic at upstream routers
- Authentication and secret search mechanisms for RFID-aware wireless sensor networks
- An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
- Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
- Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
- Lightweight authentication protocol for mobile RFID networks
- A cross-layer authentication design for secure video transportation in wireless sensor network
No comments:
Post a Comment
Note: only a member of this blog may post a comment.