Contents
-
Requires Authentication UnlicensedSecurity in Sensor NetworksLicensedNovember 5, 2010
-
Requires Authentication UnlicensedSecurity Solutions for Uplink- and Downlink-Traffic in Wireless Sensor NetworksLicensedNovember 5, 2010
-
Requires Authentication UnlicensedAttacker Models for Wireless Sensor NetworksLicensedNovember 5, 2010
-
Requires Authentication UnlicensedDetecting Compromised Nodes in Wireless Sensor Networks: Misbehavior-based Detection versus Attestation-based DetectionLicensedNovember 5, 2010
-
Requires Authentication UnlicensedSecurity Design for Industrial Sensor NetworksLicensedNovember 5, 2010
-
Requires Authentication UnlicensedSecurity in Border Control and Area MonitoringLicensedNovember 5, 2010
-
Requires Authentication UnlicensedAnalysis and Efficiency of Randomized Optimization HeuristicsLicensedNovember 5, 2010
-
Requires Authentication UnlicensedPrivacy-compliant Disclosure of Personal Data to Third PartiesLicensedNovember 5, 2010
-
Requires Authentication UnlicensedDynamic Object Flow AnalysisLicensedNovember 5, 2010
-
Requires Authentication UnlicensedEin Plädoyer für ein Ende der Ausgrenzung der digitalen WeltLicensedNovember 5, 2010