research
∙
06/03/2020
An Authenticated Key Scheme over Elliptic Curves for Topological Networks
Nodes of sensor networks may be resource-constrained devices, often havi...
research
∙
06/03/2020
An Authenticated Key Scheme over Elliptic Curves and Security Considerations
Nodes of sensor networks may be resource-constrained devices, often havi...
research
∙
11/14/2018