Efficient Mobile Node Authentication in WSN
Vol. 35, No. 5, pp. 833-839, May 2010
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
T. Shon and K. Han, "Efficient Mobile Node Authentication in WSN," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 5, pp. 833-839, 2010. DOI: .
[ACM Style]
Taeshik Shon and Kyusuk Han. 2010. Efficient Mobile Node Authentication in WSN. The Journal of Korean Institute of Communications and Information Sciences, 35, 5, (2010), 833-839. DOI: .
[KICS Style]
Taeshik Shon and Kyusuk Han, "Efficient Mobile Node Authentication in WSN," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 5, pp. 833-839, 5. 2010.