OUTSOURCING OF SECURITY PROTOCOLS IN CONSTRAINED DEVICES
Wireless Sensor Network (WSN) has become an interesting field in computer science due to its diversified applicability that includes military applications, industrial applications, home applications, monitoring temperature, etc. Wireless sensor nodes have many limitations in computational capabiliti...
Main Author: | NARAYANAMOORTHY, KAUSHIK |
---|---|
Format: | Others |
Published: |
OpenSIUC
2015
|
Online Access: | https://opensiuc.lib.siu.edu/theses/1724 https://opensiuc.lib.siu.edu/cgi/viewcontent.cgi?article=2738&context=theses |
Similar Items
-
Secure Communications for Resource-Constrained IoT Devices
by: Abd-Elhamid M. Taha, et al.
Published: (2020-06-01) -
Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud
by: Yu Wu, et al.
Published: (2020-01-01) -
A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing
by: Zhijun Wei, et al.
Published: (2019-01-01) -
Insourcing / Outsourcing for Security Management
by: Chen, Hung-Che, et al.
Published: (2014) -
A Case of Applying the Theory of Constrains to Improve the Outsourcing Subcontract Management
by: Gwo-Sheng Shieh, et al.
Published: (2010)