ESAS   2007 Security in Ad-hoc and Sensor Networks
Wall of Fame | Most Viewed ESAS-2007 Paper
13 years 9 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source218
2Download preprint from source210
3Download preprint from source192
4Download preprint from source169
5Download preprint from source164
6Download preprint from source163
7Download preprint from source162
8Download preprint from source160
9Download preprint from source152
10Download preprint from source143
11Download preprint from source132
12Download preprint from source127
13Download preprint from source110
14Download preprint from source108