Login / Signup
Logic Encryption for Resource Constrained Designs.
David M. Luria
Ranga Vemuri
Published in:
IEEE Access (2021)
Keyphrases
</>
resource constrained
key management
resource constraints
wireless sensor networks
sensor networks
visual sensor networks
resource limitations
security mechanisms
multipath
data collection
embedded systems
leader follower