Ad hoc network security: peer identification and authentication using signal properties

Author(s):  
T. Suen ◽  
A. Yasinsac
2005 ◽  
Author(s):  
Patrick W. Fitzgibbons ◽  
Digen Das ◽  
Larry J. Hash

Author(s):  
Haiyun Luo ◽  
Hao Yang ◽  
Lixia Zhang ◽  
Fan Ye ◽  
Jiejun Kong ◽  
...  

2013 ◽  
Author(s):  
Debnath Bhattacharyya ◽  
◽  
Bijoy Kumar Manadal ◽  
Suntae Kim ◽  

2019 ◽  
Vol 1 (2) ◽  
pp. 15
Author(s):  
Huang Jie

Security threats and shows abnormality about security, safety, privacy and trust as network security-related data, in short, security-related data. Apparently, the first step to detect network attacks and intrusions is to collect the security-related data. In this paper, we will present a lot of approaches to solving Networks and Information Security issues. We survey network security in LTE technologies, Vehicular Ad-Hoc Network, and security in Wireless Sensor Network. Internet of Things. In this paper, we describe many methods in Information Security. Is consist of Information Security in Big Data and Cloud Computing.


Sign in / Sign up

Export Citation Format

Share Document