The following pages link to SPINS (Q15196):
Displaying 25 items.
- A dynamic prime number based efficient security mechanism for big sensing data streams (Q314794) (← links)
- On optimal cryptographic key derivation (Q388109) (← links)
- HORSIC: an efficient one-time signature scheme for wireless sensor networks (Q456121) (← links)
- Modeling and verifying ad hoc routing protocols (Q462483) (← links)
- Quantum security in wireless sensor networks (Q609030) (← links)
- Secure and highly-available aggregation queries in large-scale sensor networks via set sampling (Q658674) (← links)
- Chaos block cipher for wireless sensor network (Q954433) (← links)
- SecLEACH-on the security of clustered sensor networks (Q971108) (← links)
- CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks (Q991770) (← links)
- Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks (Q1004318) (← links)
- Formal models and analysis of secure multicast in wired and wireless networks (Q1040779) (← links)
- A survey on position-based routing algorithms in wireless sensor networks (Q1662466) (← links)
- Security-aware scheduling for flexray-based real-time automotive systems (Q2298396) (← links)
- A new protocol for the detection of node replication attacks in mobile wireless sensor networks (Q2434545) (← links)
- Step-size sequence design for finite-time average consensus in secure wireless sensor networks (Q2454145) (← links)
- Rijndael for Sensor Networks: Is Speed the Main Issue? (Q2864184) (← links)
- Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks (Q3076975) (← links)
- (Q3183800) (← links)
- An efficient key management protocol for wireless sensor networks (Q3443351) (← links)
- Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks (Q3449415) (← links)
- Verifying Security Protocols for Sensor Networks Using Algebraic Specification Techniques (Q3522871) (← links)
- A Distributed Data Storage Scheme for Sensor Networks (Q3556583) (← links)
- Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games (Q3556623) (← links)
- Nested block design as key pre-distribution in wireless sensor networks (Q5063276) (← links)
- ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks (Q5197648) (← links)