Secure Connectivity Through Key Predistribution Under Jamming Attacks In Ad Hoc and Sensor Networks
Year of publication: |
2010-12-23
|
---|---|
Authors: | Panyim, Korporn |
Other Persons: | Yi Qian (contributor) ; David Tipper (contributor) ; Prashant Krishnamurthy (contributor) ; James B.D. Joshi (contributor) ; Richard Thompson (contributor) |
Publisher: |
PIT |
Subject: | Information Science |
-
Sutton, Melanie, (2010)
-
Branding a region : the next step for the regional tourism organization of Southern Africa
Manasoe, Benjamin, (2009)
-
Decision support systems for the Letsemeng Local Municipality
Mofokeng, Mpuse Frans, (2009)
- More ...
-
A requirements-driven trust framework for secure interoperation in open environments
Chandran, Suroop Mohan, (2006)
-
Technical Architectures and Economic Conditions for Viable Spectrum Trading Markets
Caicedo Bastidas, Carlos Enrique, (2009)
-
The Effect of Voice Packet Size on End-To-End delay in 802.11b Networks
Phalgun, Haritha, (2003)
- More ...