| Document Date: 2011-11-09 13:26:15 Open Document File Size: 215,26 KBShare Result on Facebook
Company Needham / A1 K AB / A3 K AB / A2 K AB / Ki / Peng Ning Cyber Defense Laboratory / / / Event FDA Phase / / Facility Computer Science Department North Carolina State University / / IndustryTerm ad-hoc wireless networks / overall network / sensor networks / battery-operated sensor devices / ad hoc wireless networks / large network / setup server / important technology / economical solution / distributed sensor networks / interactive node-to-node authentication protocol / Wireless Networks Journal / wireless sensor networks / jth key chain / distributed systems / wireless communication / wireless communication links / sensor network / / Organization Army Research Office / North Carolina State University / Raleigh / National Science Foundation / / Person R. Szewczyk / V / K BA / Sybil Attacks / Overhead Storage (Bytes) / / Product Franklin / K4 / / PublishedMedium Communications of the ACM / / Technology encryption / cryptography / public key / peer-to-peer / Sensor Network Protocols / Security protocols / secret key / simulation / interactive node-to-node authentication protocol / using symmetric key cryptography to defeat Sybil attacks / /
SocialTag |