The costs and benefits related to cyber security breaches Chapter 3 – Gordon & Loeb.
1 Security of Sensor Networks Tanya Roosta TRUST Seminar UC Berkeley, November 9, 2006.
Security of Sensor Networks
1 Confidentiality Cryptography & Network Security H. Yoon Confidentiality Using Conventional Encryption Where should cryptographic functionality be located?