Author:
Boubiche Djallel Eddine,Athmani Samir,Boubiche Sabrina,Toral-Cruz Homero
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference115 articles.
1. Akyildiz, F., Sankarasubramaniam, W. S., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.
2. Bala, S., Sharma, G., & A. K. Verma (2012). A survey and taxonomy of symmetric key management schemes for wireless sensor networks. In CUBE ‘12 proceedings of the CUBE international information (pp. 585–592).
3. Lecture notes in computer science;T Dimitriou,2005
4. Soroush, H., Salajegheh, M., & Dimitriou, T. (2007). Providing transparent security services to sensor networks. In ICC (pp. 3431–3436). IEEE.
5. Boukerche, A., Ren, Y., & Mokdad, L. (2010). Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness. In Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks, Q2SWinet ‘10 (pp. 33–40). New York, NY: ACM.
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献