Author:
Mishra Alekha Kumar,Turuk Ashok Kumar
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference56 articles.
1. Localization techniques in wireless sensor networks;Alrajeh;Int J Distrib Sensor Netw,2013
2. Dynamic packet beaconing for {GPSR} mobile ad hoc position-based routing protocol using fuzzy logic;Alsaqour;J Netw Comput Appl,2015
3. Becker G. Merkle signature schemes, Merkle trees and their cryptanalysis, Technical Report, Ruhr-University Bochum, Germany, 2008.
4. Bekara C, Laurent-Maknavicius M. A new protocol for securing wireless sensor networks against nodes replication attacks. In: Proceedings of third IEEE international conference on wireless and mobile computing, networking and communications, WiMOB׳07, IEEE; 2007. p. 59–66.
5. Bellare M, Canetti R, Krawczyk H. Keying hash functions for message authentication. In: Advances in Cryptology—CRYPTO ׳96, vol. 1109, LNCS, Springer-Verlag, London; 1996. p. 01–15.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献