×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [key predistribution]
Documents
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz
214 views
Technology
Trustworthy computing under resource constraints with the down policy
488 views
Engineering
Modelling pairwise key predistribution in the presence of unreliable links
798 views
Engineering
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
25 views
Documents
ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS
4 views
Documents
Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University
215 views
Documents
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai
216 views
Documents
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department
214 views
Documents
Ad Hoc Networks Mira Vrbaski
[email protected]
. Introduction Attacks and Treats in WSN Information and node authentication Holistic security approach
221 views
Documents
Security in Wireless Sensor Networks (WSN)
138 views
Documents
1 Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix Author: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol. 10, no
219 views
Documents
Wireless Network Keys Management What is WSN ? Steven Du ID: 3880740. CSI 5148
216 views
Next >