Author:
Chakavarika Tafadzwa Tapuwa,Gupta Shashi Kant,Chaurasia Brijesh Kumar
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference23 articles.
1. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11, 52–73. doi:
10.1109/surv.2009.090205
.
2. Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and communications security-CCS ‘02, (pp. 41–47). doi:
10.1145/586110.586117
.
3. Pandey, M., & Verma, S. (2013). Privacy provisioning in wireless sensor networks. Wireless Personal Communications, 75, 1115–1140. doi:
10.1007/s11277-013-1411-6
.
4. ETSI. (2014). Quantum safe cryptography and security; an introduction, benefits, enablers and challenges.
https://portal.etsi.org/Portals/0/TBpages/QSC/Docs/Quantum_Safe_Whitepaper_1_0_0.pdf
. Accessed 15 Nov 2015.
5. Chan, H., & Perrig, A. (2003). Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11–14 May 2003, (pp. 197–213). Berkeley: California.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献