Loading...
Preserving Source Location Privacy for Energy Harvesting WSNs
Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-locati...
Na minha lista:
| Udgivet i: | Sensors (Basel) |
|---|---|
| Main Authors: | , , , |
| Format: | Artigo |
| Sprog: | Inglês |
| Udgivet: |
MDPI
2017
|
| Fag: | |
| Online adgang: | https://ncbi.nlm.nih.gov/pmc/articles/PMC5421684/ https://ncbi.nlm.nih.gov/pubmed/28358341 https://ncbi.nlm.nih.govhttp://dx.doi.org/10.3390/s17040724 |
| Tags: |
Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!
|