@alexafedrica

Integration of security and authentication agent in ns-2 and leach protocol for wireless sensor network

. International Journal of Information Technology, Modeling and Computing (IJITMC), 2 (2): 1 to 10 (May 2014)

Links and resources

Tags