Digital Library
Search Results: [ keyword: Security analysis ] (2)
1.
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing
2.
[CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
Abedelaziz Mohaisen,
Jeong Woon Choi,
Dowon Hong,
Vol. 3, No. 4, August 30, 2009
10.3837/tiis.2009.04.003
