2015 27th International Conference on Microelectronics (ICM) 2015
DOI: 10.1109/icm.2015.7437981
|View full text |Cite
|
Sign up to set email alerts
|

Security approaches based on elliptic curve cryptography in wireless sensor networks

Abstract: Wireless sensor networks are ubiquitous in monitoring applications, medical control, environmental control and military activities... In fact, a wireless sensor network consists of a set of communicating nodes distributed over an area in order to measure a given magnitude, or receive and transmit data independently to a base station which is connected to the user via the Internet or a satellite, for example. Each node in a sensor network is an electronic device which has calculation capacity, storage, communic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…This obviously leads to the property that any sub-tree of a balanced binary tree under AVL tree is balanced (Salah et al , 2015) in the sense AVL.…”
Section: Technical Methods Used In the Proposed Approachmentioning
confidence: 99%
“…This obviously leads to the property that any sub-tree of a balanced binary tree under AVL tree is balanced (Salah et al , 2015) in the sense AVL.…”
Section: Technical Methods Used In the Proposed Approachmentioning
confidence: 99%