Sciweavers

21 search results - page 5 / 5
» An efficient dynamic-identity based signature scheme for sec...
Sort
View
MOBIHOC
2008
ACM
14 years 5 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao