Sciweavers

76 search results - page 16 / 16
» Pipelining GF(P) Elliptic Curve Cryptography Computation
Sort
View
ADHOC
2007
109views more  ADHOC 2007»
13 years 5 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang