Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers.Sign up
- United States
Jamming attack scenario for wireless sensor networks with CC2420 motes using only off-the-shelf motes.
A C implementation of a Secure Audit Log based on the protocol by Bruce Schneier and John Kelsey.
Biba Integrity Model implementation in Java
Automatically exported from code.google.com/p/sii-challenge