Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference66 articles.
1. Abuzneid AS, Sobh T, Faezipour M. An enhanced communication protocol for location privacy in wsn. Int J Distrib Sens Netw 2015, Article 62 (January 2015), 1. 10.1155/2015/697098.
2. Al-Riyami SS, Paterson KG. Certificateless public key cryptography. In: Advances in cryptology—ASIACRYPT. Springer; 2003. p. 452–73.
3. Alcaraz C, Najera P, Lopez J, Roman R. Wireless sensor networks and the internet of things: do we need a complete integration? In: The first international workshop on the security of the internet of things (SecIoT׳10), vol. 13, no. 10; 2010. p. 611–22.
4. A survey on security techniques in group communication for wireless sensor networks;Annapurna;Int J Comput Appl,2015
5. Bao X, Liu J, She L, Zhang S. A key management scheme based on grouping within cluster. In: 2014 11th world congress on intelligent control and automation (WCICA); 2014. p. 3455–60. http://dx.doi.org/10.1109/WCICA.2014.7053290.
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献