Login / Signup
TRAIL: Topology Authentication in RPL.
Heiner Perrey
Martin Landsmann
Osman Ugus
Matthias Wählisch
Thomas C. Schmidt
Published in:
EWSN (2016)
Keyphrases
</>
identity authentication
security analysis
user authentication
biometric authentication
low cost
authentication scheme
semi fragile watermarking
database
digital images
secret key
topology preserving
image authentication
encryption decryption
integrity verification