Login / Signup
Providing Secure Environments for Untrusted Network Applications.
Qun Zhong
Published in:
WETICE (1997)
Keyphrases
</>
network model
wireless sensor networks
complex networks
computer networks
communication networks
real world
peer to peer
network structure
network traffic
network architecture
security measures
real time
network topologies
network resources
sensitive data
third party
dynamic environments