Author:
Aupet J. -B.,Garcia E.,Guyennet H.,Lapayre J. -C.,Martins D.
Publisher
Springer Berlin Heidelberg
Reference42 articles.
1. Abendroth, J., Seigneur, J.-M.: Deploying the trusted platform module (TPM) to increased fairness and trust in P2P file sharing servents. In: ISP 2006: Proceedings of the 5th WSEAS International Conference on Information Security and Privacy, pp. 202–207 (2006)
2. AuthenticationWorld.com: The business of authentication, http://www.authenticationworld.com/
3. Bernecker, O.: Biometrics security: An end user perspective. Giesecke and Devrient GmbH, Germany. Information security technical report 11, 111–118 (2006)
4. Čapkun, S., Buttyán, L., Hubaux, J.-P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32 (2003)
5. Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 113–126 (2005)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献