Most Accessed Articles

Comprehensive Study of Security Solutions in Radio Frequency Identification Systems

, 2017; 7(1): 5-19.

Gyozo Godor* and Sandor Imre


DOI: 10.2174/2210327907666170222095442


A Survey on VANETs Security Attacks and Sybil Attack Detection

, 2016; 6(1): 45-62.

Chaitanya Kumar Karn and Chandra Prakash Gupta


DOI: 10.2174/2210327905999151103170103


Energy-efficient Scheduling for Leakage Detection in Long-distance Pipeline

, 2017; 7(1): 53-64.

Samia Allaoua Chelloug*


DOI: 10.2174/2210327907666170104114443


Secure MDM-OFDM-Ro-FSO System Using HG Modes

, 2015; 5(1): 13-18.

Angela Amphawan, Sushank Chaudhary and Brij B. Gupta


DOI: 10.2174/2210327905999150521110316


Revised Multi-Chain PEGASIS for Wireless Sensor Networks

, 2016; 6(1): 12-17.

Deepak Sethi and Partha Pratim Bhattacharya


DOI: 10.2174/2210327905666150914225227


Editorial (Hot Topic: Wireless Networking for Control and Applications)

, 2012; 2(2): 67-67.

Sing Kiong Nguang and Dan Huang


DOI: 10.2174/2210327911202020067


Webmaster Contact: info@benthamscience.org
Copyright © 2018 Bentham Science