Sciweavers

3349 search results - page 50 / 670
» Data Security
Sort
View
IMCS
2000
42views more  IMCS 2000»
15 years 2 months ago
Disaster recovery planning: a strategy for data security
Steve M. Hawkins, David C. Yen, David C. Chou
111
Voted
TMC
2010
138views more  TMC 2010»
15 years 29 days ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu