Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (0)
Journals and Conferences
In Wireless Sensor Networks (WSNs), sensors may be deployed in hostile environments or in some security-sensitive applications exposing them to tampering and to many several security issues. As such, developing secure routing protocols for sensor networks is a crucial issue. The heart of security protocols is the key distribution algorithm. Many key… (More)