A low-entropy first-degree secure provable masking scheme for resource-constrained devices.
Shivam BhasinJean-Luc DangerSylvain GuilleyZakaria NajmPublished in: WESS (2013)
Keyphrases
- resource constrained
- security mechanisms
- key management
- wireless sensor networks
- sensor networks
- resource constraints
- embedded systems
- visual sensor networks
- resource limitations
- rfid tags
- multipath
- sensor nodes
- mobile devices
- lightweight
- context aware
- real time
- data collection
- image quality
- relational databases
- leader follower
- data sets