×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [node compromise]
3 packet-hiding methods for preventing selective
1.936 views
© Lourdes López Santidrián1 Ubiquitous and Secure Networks and Services: Ubiquitous Systems Security Ubiquitous and Secure Networks and Services Redes
215 views
Packet hiding methods for preventing selective
153 views
packet-hiding methods for preventing selective jamming attacks
1.344 views
Phase 2 Final Review
29 views
Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks PerSec 2006 Speaker: Prof. Rick Han Coauthors Jing Deng and
220 views
Routing Protocol for Wireless Sensor Network in Hostile Environments
52 views
Suresh Giridarapuram CS 6204 Mobile Computing Virginia Tech
39 views
Security and Cooperation in Wireless Networks
39 views
Ubiquitous and Secure Networks and Services Redes y Servicios Ubicuos y Seguros
33 views