Login / Signup
A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments.
Jia Hao Kong
Li-Minn Ang
Kah Phooi Seng
Published in:
J. Netw. Comput. Appl. (2015)
Keyphrases
</>
resource constrained
key management
wireless sensor networks
resource constraints
sensor networks
security mechanisms
visual sensor networks
resource limitations
optimal solution
smart card
multipath
search algorithm
benchmark problems
embedded systems