Author:
Lu R.,Lin X.,Zhang C.,Zhu H.,Ho P.-H.,Shen X.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Enhanced Scheme of Excluding Compromised Nodes in Wireless Sensor Networks;Journal of Physics: Conference Series;2019-11-01
2. Pruning Route Modifiers in Wireless Sensor Networks;Wireless Personal Communications;2016-03-16
3. EP2AC: An Efficient Privacy-Preserving Data Access Control Scheme for Data-Oriented Wireless Sensor Networks;2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS);2014-08
4. Public key distribution scheme for delay tolerant networks based on two-channel cryptography;Journal of Network and Computer Applications;2012-05
5. An efficient anonymous communication protocol for wireless sensor networks;Wireless Communications and Mobile Computing;2011-10-06