Secure Connectivity Through Key Predistribution Under Jamming Attacks In Ad Hoc and Sensor Networks
Year of publication: |
2010-12-23
|
---|---|
Authors: | Panyim, Korporn |
Other Persons: | Yi Qian (contributor) ; David Tipper (contributor) ; Prashant Krishnamurthy (contributor) ; James B.D. Joshi (contributor) ; Richard Thompson (contributor) |
Publisher: |
PIT |
Subject: | Information Science |
-
Sutton, Melanie, (2010)
-
Branding a region : the next step for the regional tourism organization of Southern Africa
Manasoe, Benjamin, (2009)
-
Decision support systems for the Letsemeng Local Municipality
Mofokeng, Mpuse Frans, (2009)
- More ...
-
Technical Architectures and Economic Conditions for Viable Spectrum Trading Markets
Caicedo Bastidas, Carlos Enrique, (2009)
-
The Effect of Voice Packet Size on End-To-End delay in 802.11b Networks
Phalgun, Haritha, (2003)
-
Impacts of entry by counterfeiters
Qian, Yi, (2008)
- More ...