Digital Library
Search Results: [ keyword: RC ] (374)
Wei Huang,
Lixin Ding,
Sung-Kwun Oh,
Chang-Won Jeong,
Su-Chong Joo,
Vol. 4, No. 4, August 26, 2010
10.3837/tiis.2010.08.008
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Xiangrui Chen,
Gyoung-Bae Kim,
Hae-Young Bae,
Vol. 4, No. 2, April 28, 2010
10.3837/tiis.2010.04.005
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Manar Mohaisen,
Hongsun An,
KyungHi Chang,
Vol. 3, No. 6, December 29, 2009
10.3837/tiis.2009.06.005
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
116.
[CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
Abedelaziz Mohaisen,
Jeong Woon Choi,
Dowon Hong,
Vol. 3, No. 4, August 30, 2009
10.3837/tiis.2009.04.003
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Md. Mokammel Haque,
Al-Sakib Khan Pathan,
Choong Seon Hong,
member,
Eui-Nam Huh,
member,
Vol. 2, No. 5, October 24, 2008
10.3837/tiis.2008.05.004
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Min Hong,
Samuel W. J. Welch,
Sunhwa Jung,
Min-Hyung Choi,
Doo-Soon Park,
Vol. 2, No. 1, February 24, 2008
10.3837/tiis.2008.01.004
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)