Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference30 articles.
1. IEEE Standards Association. Part 15.4 : Low-rate wireless personal area networks (lr-wpans)
2. Rogaway, P., et al. (2003). OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC), 6(3), 365–403.
3. Fouque, P.-A., Martinet, G., Valette, F., & Zimmer, S. (2008). On the security of the ccm encryption mode and of a slight variant. In Applied cryptography and network security (pp. 411–428). Berlin: Springer.
4. Lee, J., Leung, V., Wong, K., Cao, J., & Chan, H. (2007). Key management issues in wireless sensor networks: current proposals and future developments. Wireless Communications, IEEE, 14, 76–84.
5. Menezes, A. J., Vanstone, S. A., & Oorschot, P. C. V. (1996). Handbook of applied cryptography (1st ed.). Boca Raton: CRC Press, Inc.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献