Login / Signup
Using encryption for authentication: Wireless sensor network case.
Filip Jurnecka
Vashek Matyas
Published in:
SECON (2013)
Keyphrases
</>
wireless sensor networks
image authentication
identity authentication
data encryption
elliptic curve cryptography
energy efficient
encryption decryption
case based reasoning
sensor networks
secret key
key management
wireless sensor
authentication scheme
public key cryptography