The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If
For the source limitations and vulnerabilities of the sensor nodes of Wireless Sensor Networks, we propose the new kind of dynamic key protocol for wireless sen
Applying the theorems of Mobius inverse and Dirichlet inverse, a general algorithm to obtain biorthogonal functions based on generalized Fourier series analysis