Author:
Gaur Shailendra Singh,Gupta Megha,Gupta Gautam
Reference16 articles.
1. Pranggono Abdullahi Araboand Bernardi (2013) Mobile malware and smart device security: trends, challenges and solutions. IEEE, The Oxford Internet Institute (OII), UK
2. Gaw S, Felten EW (2006) Password management strategies for online accounts. In: Proceedings of the second symposium on Usable privacy and security, pp 44–55
3. Jiang Z, Fu C, Wei W, Wei A (2013) An energy balanced algorithm of LEACH protocol in WSN. Int J Comput Sci Issues 354–359
4. Kishan Rao K, Brahma Reddy B (2013) A mmodified clustering for LEACH algorithm in WSN. IJACSA 4(5). VBIT, India and Vaagdevi College of Engineering, Warangal, India
5. Lin H, Zhou Y, Zhang Q (2010) CL-PKC based secure multicast communication for P2P network. In: 2010 second international conference on network security, wireless communications and trusted computing. IEEE, pp 154–157