Login / Signup

Security Services Using Crowdsourcing.

Rohit VermaSushmita Ruj
Published in: ANT/SEIT (2014)
Keyphrases
  • security services
  • security protocols
  • personal information
  • security mechanisms
  • key management
  • resource constrained
  • government services
  • authentication mechanism
  • wireless sensor networks
  • access control