Search All Articles

Search by:
A Non-interference Isolation Mapping to Eliminate Timing Channel Attacks
A Distributed Method for Preventing Wormhole Attacks in Wireless Sensor Networks
Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing
Design of an Artificial Evolutionary Fuzzy Immune System for Computer Network Security