Digital Library
Search Results: [ keyword: Architecture ] (28)
Chenlei Cao,
Ru Zhang,
Mengyi Zhang,
Yixian Yang,
Vol. 7, No. 5, May 30, 2013
10.3837/tiis.2013.05.020
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Chun-Ta Li,
Cheng-Chi Lee,
Chi-Yao Weng,
Chun-I Fan,
Vol. 7, No. 1, January 29, 2013
10.3837/tiis.2013.01.008
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Muhammad Omer Farooq,
Marc St-Hilaire,
Thomas Kunz,
Vol. 6, No. 1, January 29, 2012
10.3837/tiis.2012.01.011
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
27.
[CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
Abedelaziz Mohaisen,
Jeong Woon Choi,
Dowon Hong,
Vol. 3, No. 4, August 30, 2009
10.3837/tiis.2009.04.003
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Md. Mokammel Haque,
Al-Sakib Khan Pathan,
Choong Seon Hong,
member,
Eui-Nam Huh,
member,
Vol. 2, No. 5, October 24, 2008
10.3837/tiis.2008.05.004
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)