Login / Signup
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
Raghav V. Sampangi
Srinivas Sampalli
Published in:
Sensors (2015)
Keyphrases
</>
wireless networks
resource constrained
encryption scheme
resource constraints
wireless communication
wireless sensor networks
sensor networks
data sharing
public key
ad hoc networks
key management
secret key
hash functions
lossless compression
multipath
power consumption