Information Technology Reference
In-Depth Information
12. Lim, C.H.: LEAP++: A Robust Key Establishment Scheme forWireless Sensor Networks.
In: The 28th International Conference on Distributed Computing Systems Workshops,
vol. 1545-0678/08. IEEE, Beijing (2008)
13. Wang, H., Sheng, B., Tan, C.C., Li, Q.: Comparing Symmetric-key and Public-key based
Security Schemes in Sensor Networks: A Case Study of User Access Control. In: The 28th
International Conference on Distributed Computing Systems, vol. 1063-6927/08. IEEE,
Beijing (2008)
14. Saleem, K., Fisal, N., Abdullah, M.S., Zulkarmwan, A.B., Hafizah, S., Kamilah, S.:
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs. In:
Asian Conference on Intelligent Information and Database Systems, pp. 277-282. IEEE,
Quang Binh University, Dong Hoi City (2009)
15. Li, G., He, J., Fu, Y.: A Distributed Intrusion Detection Scheme for Wireless Sensor
Networks. In: The 28th International Conference on Distributed Computing Systems
Workshops, pp. 309-314. IEEE, Beijing (2008)
 
Search WWH ::




Custom Search