×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [wormhole attacks]
Documents
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath
226 views
Documents
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State
218 views
Documents
Towards Provable Secure Neighbor Discovery in Wireless Networks Marcin Poturalski Panos Papadimitratos Jean-Pierre Hubaux
220 views
Documents
No Matter Where You Go, There You Are: Secure Localization Techniques for Mobile Wireless Networks
37 views
Documents
LAD: Location Anomaly Detection for Wireless Sensor Networks
28 views
Documents
Towards Provable Secure Neighbor Discovery in Wireless Networks
37 views
Documents
Monte Carlo Techniques for Secure Localization ARO Workshop on Localization in Wireless Sensor Networks 14 June 2005 David
228 views
< Prev