Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are know...
This paper proposes a novel and successful method for recognizing palmprint based on radial basis probabilistic neural network (RBPNN) proposed by us. The RBPNN is trained by the ...
Li Shang, De-Shuang Huang, Ji-Xiang Du, Chun-Hou Z...
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
New technological trends lead to the increasing use of network technologies in automation. Especially the Ethernet with TCP/IP and wireless networks find growing acceptance. The r...