SPINS
From MaRDI portal
Software:15196
swMATH2657MaRDI QIDQ15196FDOQ15196
Author name not available (Why is that?)
Cited In (25)
- Title not available (Why is that?)
- A survey on position-based routing algorithms in wireless sensor networks
- ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks
- CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks
- SecLEACH-on the security of clustered sensor networks
- Chaos block cipher for wireless sensor network
- Step-size sequence design for finite-time average consensus in secure wireless sensor networks
- Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games
- An efficient key management protocol for wireless sensor networks
- Verifying Security Protocols for Sensor Networks Using Algebraic Specification Techniques
- A new protocol for the detection of node replication attacks in mobile wireless sensor networks
- Quantum security in wireless sensor networks
- A dynamic prime number based efficient security mechanism for big sensing data streams
- HORSIC: an efficient one-time signature scheme for wireless sensor networks
- Modeling and verifying ad hoc routing protocols
- A Distributed Data Storage Scheme for Sensor Networks
- Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks
- Formal models and analysis of secure multicast in wired and wireless networks
- Nested block design as key pre-distribution in wireless sensor networks
- Security-aware scheduling for flexray-based real-time automotive systems
- Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks
- Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
- Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
- Rijndael for sensor networks: is speed the main issue?
- On optimal cryptographic key derivation
This page was built for software: SPINS