×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [compromised nodes]
A Dynamic En-route Filtering Scheme for Data
147 views
Security issues
423 views
Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links Abstract Wildcard identity-based encryption (IBE) provides an effective means
214 views
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi
220 views
015 spins
342 views
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE VOTE AND REPORT INJECTION ATTACKS
86 views
Security Issues in MANET
380 views
Welcome to International Journal of Engineering Research and Development (IJERD)
462 views
A security method for multiple attacks in sensor networks against the false report injection attack and the sinkhole attack
247 views
A secure routing process to simultaneously defend against false report and wormhole attacks in sensor networks
33 views
Ensp energy efficient next hop selection in a probabilistic voting based filtering scheme using fuzzy logic
42 views
Redundancy Management in Heterogeneous Wireless Sensor Networks
224 views
Next >