z-logo
open-access-imgOpen Access
Encryption Techniques for Different Introducer’s Attack in Wireless Sensor Networks
Author(s) -
Dharamainder Choudhary
Publication year - 2016
Publication title -
indian journal of science and technology
Language(s) - English
Resource type - Journals
eISSN - 0974-6846
pISSN - 0974-5645
DOI - 10.17485/ijst/2016/v9i48/101741
Subject(s) - computer science , wireless sensor network , wireless network , wireless wan , key distribution in wireless sensor networks , unified modeling language , computer network , network simulation , wi fi array , wireless , vulnerability (computing) , embedded system , computer security , telecommunications , software , operating system

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here