Login / Signup
An Id-based Multiple Authentication scheme against attacks in wireless sensor networks.
Siwei Peng
Published in:
CCIS (2012)
Keyphrases
</>
authentication scheme
wireless sensor networks
security flaws
public key
key management
smart card
energy consumption
user authentication
sensor networks
secret key
security analysis
security protocols
privacy protection
key distribution
key agreement