Sciweavers

SUTC   2006 Ubiquitous Sensor Networks
Wall of Fame | Most Viewed SUTC-2006 Paper
SUTC
2006
IEEE
14 years 6 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source197
2Download preprint from source196
3Download preprint from source194
4Download preprint from source187
5Download preprint from source180
6Download preprint from source170
7Download preprint from source167
8Download preprint from source165
9Download preprint from source162
10Download preprint from source161
11Download preprint from source158
12Download preprint from source158
13Download preprint from source154
14Download preprint from source153
15Download preprint from source150
16Download preprint from source147
17Download preprint from source146
18Download preprint from source142
19Download preprint from source138
20Download preprint from source133
21Download preprint from source131
22Download preprint from source129
23Download preprint from source129
24Download preprint from source126
25Download preprint from source120
26Download preprint from source118
27Download preprint from source115
28Download preprint from source114
29Download preprint from source112
30Download preprint from source112
31Download preprint from source109
32Download preprint from source102
33Download preprint from source102