您当前的位置:
首页 >
文章列表页 >
Analysis and improvement of sensor networks security protocol
更新时间:2024-10-14
    • Analysis and improvement of sensor networks security protocol

    • Vol. 32, Issue 5, Pages: 139-145(2011)
    • CLC: TN918.82;TP212.9
    • Published:2011

    移动端阅览

  • YAN Li-li1, PENG Dai-yuan1, GAO Yue-xiang1. Analysis and improvement of sensor networks security protocol[J]. 2011, 32(5): 139-145. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

937

下载量

3

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Analysis and improvement of the BACnet/IP based on identity authentication
Formal modeling and security analysis method of security protocol based on CPN
Coverage control algorithm for wireless sensor networks based on non-cooperative game
State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks
Security analysis of security protocol Swift implementations based on computational model

Related Author

Pengshou XIE
Jiafeng ZHU
Yongping KANG
Tao FENG
Wei LI
Yuxiang RAN
Xiang GONG
Tao FENG

Related Institution

School of Computer and Communications, Lanzhou University of Technology
School of Mechanical and Electrical Engineering, Lanzhou University of Technology
School of Computer and Communication, Lanzhou University of Technology
College of Information Science and Engineering, Yanshan University
The Key Laboratory for Special Fiber and Fiber Sensor of Hebei Province,Yanshan University
0