Login / Signup
Code protection for resource-constrained embedded devices.
Hendra Saputra
Guangyu Chen
Richard R. Brooks
Narayanan Vijaykrishnan
Mahmut T. Kandemir
Mary Jane Irwin
Published in:
LCTES (2004)
Keyphrases
</>
resource constrained
embedded devices
embedded systems
security mechanisms
resource constraints
sensor networks
source code
wireless sensor networks
low cost
software systems
key management
flash memory
mobile devices
security protocols
multipath
rfid tags
open source
software development