Login / Signup
Security approaches based on elliptic curve cryptography in wireless sensor networks.
Mohammed Saïd Salah
Abderrahim Maizate
Mohammed Ouzzif
Published in:
ICM (2015)
Keyphrases
</>
elliptic curve cryptography
wireless sensor networks
cryptographic algorithms
elliptic curve
high security
security analysis
public key
key management
authentication scheme
public key cryptosystems
access control
intrusion detection