×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [compromised nodes]
A Dynamic En-route Filtering Scheme for Data
146 views
Security issues
421 views
Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links Abstract Wildcard identity-based encryption (IBE) provides an effective means
212 views
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi
217 views
015 spins
342 views
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE VOTE AND REPORT INJECTION ATTACKS
85 views
Welcome to International Journal of Engineering Research and Development (IJERD)
462 views
A security method for multiple attacks in sensor networks against the false report injection attack and the sinkhole attack
244 views
Security Issues in MANET
371 views
A secure routing process to simultaneously defend against false report and wormhole attacks in sensor networks
33 views
Ensp energy efficient next hop selection in a probabilistic voting based filtering scheme using fuzzy logic
42 views
Redundancy Management in Heterogeneous Wireless Sensor Networks
223 views
Next >