×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [key predistribution]
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz
216 views
Trustworthy computing under resource constraints with the down policy
488 views
Modelling pairwise key predistribution in the presence of unreliable links
802 views
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
26 views
ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS
4 views
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University
216 views
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai
216 views
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department
215 views
Ad Hoc Networks Mira Vrbaski
[email protected]
. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach
222 views
Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix
33 views
Security in Wireless Sensor Networks (WSN)
140 views
1 Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix Author: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol. 10, no
219 views
Next >