Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks.

Autor: Anil Kumar, B., Bhaskara Rao, N., Sunitha, M. S.
Zdroj: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory & Applications (FICTA) 2014: Volume 2; 2015, p785-791, 7p
Databáze: Complementary Index