Login / Signup
Security Services Using Crowdsourcing.
Rohit Verma
Sushmita Ruj
Published in:
ANT/SEIT (2014)
Keyphrases
</>
security services
security protocols
personal information
security mechanisms
key management
resource constrained
government services
authentication mechanism
wireless sensor networks
access control