Funder
National Social Science Foundation of China
Electronic Information and Control of Fujian University Engineering Research Center
National Natural Science Foundation of China
National Key R&D Program of China
Priority Academic Program Development of Jiangsu Higher Education Institutions
Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference21 articles.
1. Brown M, Cheung D, Hankerson D, Lopez J, Kirkup M, Menezes A (2000) Pgp in constrained wireless devices. In: Proceedings of the 9th USENIX security symposium, pp 19–19
2. Capkun S, Hubaux J (2005) Secure positioning of wireless devices with application to sensor networks. In: International conference on computer communications, vol 3, pp 1917–1928
3. Cui J (2018) Securing display path for security-sensitive applications on mobile devices. Comput Mater Continua 55(1):017–017
4. Deng J, Han R, Mishra S (2005) Countermeasures against traffic analysis attacks in wireless sensor networks. In: International workshop on security, pp 113–126
5. Ganeriwal S, Capkun S, Han C, Srivastava MB (2005) Secure time synchronization service for sensor networks. In: Workshop on wireless security, pp 97–106
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献