SPINS
From MaRDI portal
Software:15196
No author found.
Related Items (25)
An efficient key management protocol for wireless sensor networks ⋮ Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks ⋮ A dynamic prime number based efficient security mechanism for big sensing data streams ⋮ Nested block design as key pre-distribution in wireless sensor networks ⋮ A survey on position-based routing algorithms in wireless sensor networks ⋮ Quantum security in wireless sensor networks ⋮ On optimal cryptographic key derivation ⋮ A new protocol for the detection of node replication attacks in mobile wireless sensor networks ⋮ Verifying Security Protocols for Sensor Networks Using Algebraic Specification Techniques ⋮ HORSIC: an efficient one-time signature scheme for wireless sensor networks ⋮ Modeling and verifying ad hoc routing protocols ⋮ Secure and highly-available aggregation queries in large-scale sensor networks via set sampling ⋮ Step-size sequence design for finite-time average consensus in secure wireless sensor networks ⋮ A Distributed Data Storage Scheme for Sensor Networks ⋮ Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games ⋮ Chaos block cipher for wireless sensor network ⋮ SecLEACH-on the security of clustered sensor networks ⋮ CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks ⋮ ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks ⋮ Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks ⋮ Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks ⋮ Security-aware scheduling for flexray-based real-time automotive systems ⋮ Unnamed Item ⋮ Formal models and analysis of secure multicast in wired and wireless networks ⋮ Rijndael for Sensor Networks: Is Speed the Main Issue?
This page was built for software: SPINS