|
Volumn 1, Issue , 2001, Pages 135-138
|
Authentication for low power systems
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CODES (SYMBOLS);
COMPUTATIONAL METHODS;
CONSTRAINT THEORY;
ELECTRIC POWER SYSTEMS;
MILITARY APPLICATIONS;
ROUTERS;
SENSORS;
LOW POWER SYSTEMS;
MESSAGE AUTHENTICATION;
PUBLIC KEY CRYPTOGRAPHY;
|
EID: 0035728159
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (4)
|
References (9)
|