Two Level Security Implementation for Voice Data Transmission.
Rupa PatelUrmila ShrawankarPublished in: ICETET (2012)
Keyphrases
- data transmission
- base station
- data acquisition
- wireless sensor networks
- data transfer
- computer networks
- energy consumption
- data delivery
- intrusion detection
- routing protocol
- communication networks
- error detection and correction
- multi hop
- energy efficient
- transmission delay
- high speed
- sensor networks
- data analysis
- data sets
- real time