Digital Library
Search Results: [ keyword: Security ] (233)
Mina Shim,
Seungjo Baek,
Taehyoung Park,
Jeongseon Seol,
Jongin Lim,
Vol. 3, No. 5, October 29, 2009
10.3837/tiis.2009.05.008
10.3837/tiis.2009.05.008
73.
Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages
74.
[CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
Abedelaziz Mohaisen,
Jeong Woon Choi,
Dowon Hong,
Vol. 3, No. 4, August 30, 2009
10.3837/tiis.2009.04.003
10.3837/tiis.2009.04.003
Abedelaziz Mohaisen,
DaeHun Nyang,
YoungJae Maeng,
KyungHee Lee,
Dowon Hong,
Vol. 3, No. 2, April 24, 2009
10.3837/tiis.2009.02.005
10.3837/tiis.2009.02.005
Jeong Ok Kwon,
Ik Rae Jeong,
Dong Hoon Lee,
Vol. 2, No. 6, December 24, 2008
10.3837/tiis.2008.06.003
10.3837/tiis.2008.06.003
Abedelaziz Mohaisen,
DaeHun Nyang,
Tamer AbuHmed,
Vol. 2, No. 5, October 24, 2008
10.3837/tiis.2008.05.001
10.3837/tiis.2008.05.001
80.
Application driven cluster based group key management with identifier in wireless sensor networks
Eui-Nam Huh,
Member,
KSII and Nahar Sultana,
Member,
KSII,
Vol. 1, No. 1, December 24, 2007
10.3837/tiis.2007.01.001
10.3837/tiis.2007.01.001