Distributed Computing

A. Secure Localization
B. Sensor Deployment in Complex Region of Interest
C. Security Threats in Clouds: Black Hole Search and Intrusion Detection using Mobile Agents