메뉴 건너뛰기




Volumn , Issue , 2010, Pages 752-755

Adaptive security established on the requirements and resource abilities of network nodes

Author keywords

Adaptive Security; Mobile Wireless Networks; Mobility; Wireless Mesh Networks

Indexed keywords

ADAPTIVE SECURITY; HOMOGENEOUS SOLUTIONS; MERKLE TREES; MOBILE WIRELESS NETWORK; MOBILE WIRELESS NETWORKS; MOBILITY; NETWORK CONNECTIVITY; NETWORK NODE; SECURITY FRAMEWORKS; SECURITY ISSUES; SECURITY REQUIREMENTS;

EID: 79955016004     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2010.5735806     Document Type: Conference Paper
Times cited : (2)

References (10)
  • 2
    • 29844457287 scopus 로고    scopus 로고
    • An efficient scheme for authenticating public keys in sensor networks
    • W. Du, R. Wang, and P. Ning, "An efficient scheme for authenticating public keys in sensor networks," in MobiHoc, 2005, pp. 58-67.
    • (2005) MobiHoc , pp. 58-67
    • Du, W.1    Wang, R.2    Ning, P.3
  • 4
    • 33947639490 scopus 로고    scopus 로고
    • Optimized hash tree for authentication in sensor networks
    • Februaury
    • V. Kondratieva and S. Seo, "Optimized hash tree for authentication in sensor networks," IEEE Communications Letters, vol. 11, no. 2, pp. 149-151, Februaury 2007.
    • (2007) IEEE Communications Letters , vol.11 , Issue.2 , pp. 149-151
    • Kondratieva, V.1    Seo, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.