A Ghosal, S Halder, S DasBit - Wireless Networks …, 2012 - search.ebscohost.com
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending …
A Ghosal, S Halder, S DasBit - Wireless Netw, 2012 - researchgate.net
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending …
A Ghosal, S Halder, S Dasbit - Wireless Networks, 2012 - dl.acm.org
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending …
A Ghosal, S Halder, S Dasbit - Wireless Networks, 2012 - search.proquest.com
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending …
A Ghosal, S Halder, S DasBit - Wireless Networks, 2012 - infona.pl
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending …
A Ghosal, S Halder, S DasBit - Wireless Networks …, 2012 - search.ebscohost.com
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending …
A Ghosal, S Halder, S DasBit - Wireless Networks, 2012 - infona.pl
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending …
[引用][C]A dynamic TDMA based scheme for securing query processing in WSN
A Ghosal, S Halder, S DasBit - Wireless networks, 2012 - Springer
[引用][C]A dynamic TDMA based scheme for securing query processing in WSN
A Ghosal, S Halder, S DasBit - Wireless Networks, 2012 - Springer