Pages that link to "Item:Q1859201"
From MaRDI portal
The following pages link to SPINS: Security protocols for sensor networks (Q1859201):
Displaying 27 items.
- SPINS (Q15196) (← links)
- On optimal cryptographic key derivation (Q388109) (← links)
- HORSIC: an efficient one-time signature scheme for wireless sensor networks (Q456121) (← links)
- Modeling and verifying ad hoc routing protocols (Q462483) (← links)
- Quantum security in wireless sensor networks (Q609030) (← links)
- Secure and highly-available aggregation queries in large-scale sensor networks via set sampling (Q658674) (← links)
- Chaos block cipher for wireless sensor network (Q954433) (← links)
- CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks (Q991770) (← links)
- Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks (Q1004318) (← links)
- Formal models and analysis of secure multicast in wired and wireless networks (Q1040779) (← links)
- A survey on position-based routing algorithms in wireless sensor networks (Q1662466) (← links)
- A new protocol for the detection of node replication attacks in mobile wireless sensor networks (Q2434545) (← links)
- Step-size sequence design for finite-time average consensus in secure wireless sensor networks (Q2454145) (← links)
- Rijndael for Sensor Networks: Is Speed the Main Issue? (Q2864184) (← links)
- Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks (Q3076975) (← links)
- (Q3183800) (← links)
- A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS (Q3393508) (← links)
- A power efficient aggregation of encrypted data in wireless sensor network (Q3443222) (← links)
- An efficient key management protocol for wireless sensor networks (Q3443351) (← links)
- Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks (Q3449415) (← links)
- Quantum Wireless Sensor Networks (Q3543342) (← links)
- A Distributed Data Storage Scheme for Sensor Networks (Q3556583) (← links)
- Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games (Q3556623) (← links)
- ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks (Q5197648) (← links)
- Security and Trust in Sensor Networks (Q5391135) (← links)
- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks (Q5862313) (← links)
- Efficient and reliable post-quantum authentication (Q6549669) (← links)