Login / Signup
A Network Partition Scheme to protect secure zone for malicious code.
Jungeun Jee
Joopal Jang
Inhee Jo
Yongtae Shin
Published in:
ICOIN (2013)
Keyphrases
</>
malicious code
network traffic
wireless sensor networks
peer to peer
static analysis
standard model
authentication scheme
data encryption
artificial intelligence
network structure
security analysis
key distribution
wireless networks
privacy protection
diffie hellman