×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [malicious node]
Home >
malicious node
Securing Underwater wireless communication networks Report
778 views
Implementing Grid Security Concepts EU FP6 Projects AssessGrid & GridTrust Syed Naqvi
[email protected]
07 September 2007, Budapest - Hungary.
212 views
Tempering Kademlia with a Robust Identity-based System Luca Aiello, Marco Milanesio, Giancarlo Ruffo, and Rossano Schifanella Giancarlo Ruffo SecNet Group.
217 views
Embedding identity in DHT systems: security, reputation and social networking management 1 Embedding Identity in DHT Systems: Security, Reputation and.
217 views
Secure routing and data transmission in mobile
432 views
Security Issues in MANET
373 views
On the use of radio resource tests in wireless ad hoc networks
165 views
Wsn security issues
90 views
Wsn security issues
63 views
Securing Wireless Sensor Network (WSN) With DNA
219 views
Grey Hole Document
16 views
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
218 views
Next >