搜索结果: 1-9 共查到“军队指挥学 sensor network”相关记录9条 . 查询时间(0.109 秒)
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
user authentication key agreement cryptanalysis
2016/1/27
Recently, Farasha et al. proposed an efficient user authentication and key
agreement scheme for heterogeneous wireless sensor network tailored for the Internet
of Things environment. By using BAN-lo...
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
network homomorphic WSN Wireless Sensor Network
2015/12/22
Wireless Sensor Networks (WSN) has become more
and more important in many applications especially those required
a high level of security such as: commercial, military
and telemedicine applications...
Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski
applications / key predistribution sensor network
2012/3/28
Cichon, Golebiewski and Kutylowski (\cite{CGK}) proposed a technique for ``key redistribution'' in sensor networks. The idea is that long-term keys held by the sensor nodes are used to encrypt tempora...
Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski
applications key predistribution sensor network
2011/6/9
Cichon, Golebiewski and Kutylowski (\cite{CGK}) proposed a technique for ``key redistribution'' in sensor networks. The idea is that long-term keys held by the sensor nodes are used to encrypt tempora...
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
cryptographic protocols Connectivity Communication Reed-Muller Codes Reed-Solomon Codes Security
2010/7/14
In this paper, we suggest the idea of separately treating the connectivity and communication model of a Wireless Sensor Network(WSN). We then propose a novel connectivity model for a WSN using first o...
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
Online/Offline Identity-Based Signature Wireless Sensor Network
2010/1/18
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor
network (WSN). We argue that due to significant reduction in computational and storage costs, our
...
Practical ID-based Encryption for Wireless Sensor Network
Practical ID-based Encryption Wireless Sensor Network
2010/1/18
In this paper, we propose a new practical identity-based
encryption scheme which is suitable for wireless sensor network
(WSN). We call it Receiver-Bounded Online/Offline
Identity-based Encryption ...
Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited
Key predistribution Combinatorial Design Distributed Sensor Network
2009/6/12
A Sensor Node in Wireless Sensor Network has very limited resources such as processing capability, memory capacity, battery power, and communication capability. When the communication between any two ...
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
sensor network key distribution scheme attack cluster head.
2009/6/5
A sensor network key distribution scheme for hierarchical sensor networks was recently pro-
posed by Cheng and Agrawal. A feature of their scheme is that pairwise keys exist between
any pair of high...