Digital Library
Search Results: [ keyword: Security Architecture ] (2)
Chenlei Cao,
Ru Zhang,
Mengyi Zhang,
Yixian Yang,
Vol. 7, No. 5, May 30, 2013
10.3837/tiis.2013.05.020

2.
[CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
Abedelaziz Mohaisen,
Jeong Woon Choi,
Dowon Hong,
Vol. 3, No. 4, August 30, 2009
10.3837/tiis.2009.04.003
