A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
In Wireless Sensor Networks (WSN), data gathering using mobile sinks typically incurs constant propagation of sink location indication messages to guide the direction of data repor...
Xinxin Liu, Han Zhao, Xin Yang, Xiaolin Li, Ning W...
Sensor networks are often used to perform monitoring tasks, such as in animal or vehicle tracking and in surveillance of enemy forces in military applications. In this paper we in...
Due to the limited energy supplies of nodes in many applications like wireless sensor networks, energy efficiency is crucial for extending the lifetime of these networks. This pape...
— The use of wireless sensor networks for gathering environmental and safety-critical data in real time is increasing at a rapid rate. Some of the main criteria in designing sens...
Winnie Louis Lee, Amitava Datta, Rachel Cardell-Ol...