research
          
      
      ∙
      06/03/2020
    An Authenticated Key Scheme over Elliptic Curves for Topological Networks
Nodes of sensor networks may be resource-constrained devices, often havi...
          
            research
          
      
      ∙
      06/03/2020
    An Authenticated Key Scheme over Elliptic Curves and Security Considerations
Nodes of sensor networks may be resource-constrained devices, often havi...
          
            research
          
      
      ∙
      11/14/2018
     
             
  
  
     
                             share
 share