Designing SSL/TLS protocol for resource constrained devices.
Asad M. AliPublished in: Communication, Network, and Information Security (2006)
Keyphrases
- resource constrained
- embedded systems
- sensor networks
- wireless sensor networks
- resource constraints
- security mechanisms
- resource limitations
- lightweight
- visual sensor networks
- key management
- rfid tags
- mobile devices
- semi supervised learning
- sensor nodes
- low cost
- frequency domain
- leader follower
- data sets
- relational databases