Sciweavers

3349 search results - page 50 / 670
» Data Security
Sort
View
IMCS
2000
42views more  IMCS 2000»
14 years 9 months ago
Disaster recovery planning: a strategy for data security
Steve M. Hawkins, David C. Yen, David C. Chou
TMC
2010
138views more  TMC 2010»
14 years 8 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu