E-mail

E-mail a Wiley Online Library Link

Yanjiang Yang, Jianying Zhou, Robert H. Deng and Feng Bao Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks Security and Communication Networks 4

Article first published online: 11 JAN 2010 | DOI: 10.1002/sec.179

Thumbnail image of graphical abstract

Trusted computing technology can be applied to wireless sensor networks.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

Choose captcha format: Image or Audio. Click here if you need help.

SEARCH