Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference60 articles.
1. Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
2. Aumasson, J.P., Henzen, L., Meier, W., Plasencia, M.N.: Quark: a lightweight hash. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS, vol. 6225, pp. 1–15 (2010)
3. Batina, L., Seys, S., Singelee, D., Verbauwhede, I.: Hierarchical ECC-based RFID authentication protocol. In: 7th Workshop on RFID Security and Privacy 2011 (RFIDSec 2011), LNCS, vol. 7055, pp. 183–201 (2012)
4. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), LNCS, vol. 4727, pp. 450–466 (2007)
5. Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey March 2005. Technical Report TR-05-07, Rensselaer Polytechnic Institute (2005)
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献