The book aims to provide an overview of current knowledge regarding germ cell tumors. It deals with the clinical presentations, treatment modalities, the biology and genetics of germ …
H Modares, R Salleh… - 2011 third international …, 2011 - ieeexplore.ieee.org
Wireless sensor networks (WSN) are generally set up for gathering records from insecure environment. Nearly all security protocols for WSN believe that the opponent can achieve …
Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics …
S Peter, D Westhoff… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate …
The last years brought many novel challenges for the Internet of Things (IoT). Low capital and operational expenditures, massive deployments of devices, reliability and security are …
M Guo, X Jin, N Pissinou, S Zanlongo… - ACM Computing …, 2015 - dl.acm.org
Recent advances in mobile device, wireless networking, and positional technologies have helped location-aware applications become pervasive. However, location trajectory privacy …
D Kim, S An - IEEE Sensors Journal, 2016 - ieeexplore.ieee.org
Public-key cryptography (PKC) operations are heavy to resource-constrained sensor nodes. Therefore, attackers can cripple a sensor node by forcing it to perform a large number of …
M Peng, Y Xiao - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
[This paper has been withdrawn by the publisher]. A reference structure plays a modulation role on radiation properties such as absorption and permittivity. From the physical view, it is …
AD Nimbalkar, A Azmat… - i-Manager's Journal on …, 2023 - search.proquest.com
The main purpose of Wireless Sensor Networks (WSNs) is to collect data from unsafe environments. Almost all WSN security protocols assume that an adversary may gain …