SPINS

From MaRDI portal
Software:15196



swMATH2657MaRDI QIDQ15196


No author found.





Related Items (25)

An efficient key management protocol for wireless sensor networksKey Chain-Based Key Predistribution Protocols for Securing Wireless Sensor NetworksA dynamic prime number based efficient security mechanism for big sensing data streamsNested block design as key pre-distribution in wireless sensor networksA survey on position-based routing algorithms in wireless sensor networksQuantum security in wireless sensor networksOn optimal cryptographic key derivationA new protocol for the detection of node replication attacks in mobile wireless sensor networksVerifying Security Protocols for Sensor Networks Using Algebraic Specification TechniquesHORSIC: an efficient one-time signature scheme for wireless sensor networksModeling and verifying ad hoc routing protocolsSecure and highly-available aggregation queries in large-scale sensor networks via set samplingStep-size sequence design for finite-time average consensus in secure wireless sensor networksA Distributed Data Storage Scheme for Sensor NetworksDealing with Liars: Misbehavior Identification via Rényi-Ulam GamesChaos block cipher for wireless sensor networkSecLEACH-on the security of clustered sensor networksCMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networksECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor NetworksOf malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networksAccelerating Signature-Based Broadcast Authentication for Wireless Sensor NetworksSecurity-aware scheduling for flexray-based real-time automotive systemsUnnamed ItemFormal models and analysis of secure multicast in wired and wireless networksRijndael for Sensor Networks: Is Speed the Main Issue?


This page was built for software: SPINS