Secure sensor networks for perimeter protection.
From MaRDI portal
Recommendations
Cited in
(7)- The use of analytical hierarchy process in sensor-based networks for security-aware congestion control
- ANSWER: AutoNomouS netWorked sEnsoR system
- Chaos block cipher for wireless sensor network
- Combinatorial design of key distribution mechanisms for wireless sensor networks
- Secure Detection: Performance Metric and Sensor Deployment Strategy
- An application-oriented framework for wireless sensor network key establishment
- An efficient key management protocol for wireless sensor networks
This page was built for publication: Secure sensor networks for perimeter protection.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1427444)