This action might not be possible to undo. Are you sure you want to continue?
- An Outline of Security in Wireless Sensor Networks; Threats, Countermeasures and Implementations
- Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems
- Power Consumption Analysis of a Modern Smartphone
- A Real-time Localization System Using RFID for Visually Impaired
- Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor
- Dynamic MDS Matrices for Substantial Cryptographic Strength