2009 International Conference on Information Technology and Computer Science 2009
DOI: 10.1109/itcs.2009.103
View full text |Buy / Rent full text
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 5 publications
references
References 9 publications
0
1
0
Order By: Relevance
“…The authenticity of such commands and data is critical for the normal operation as well. Due to the resource constraints on sensor nodes and possible node compromises, broadcast authentication in wireless sensor networks is by no means a trivial problem [10].…”
Section: Security Of Broadcast Communicationmentioning
confidence: 99%
“…The authenticity of such commands and data is critical for the normal operation as well. Due to the resource constraints on sensor nodes and possible node compromises, broadcast authentication in wireless sensor networks is by no means a trivial problem [10].…”
Section: Security Of Broadcast Communicationmentioning
confidence: 99%