Impact of hash value truncation on ID anonymity in Wireless Sensor Networks
2016
Hash functions have been used to address security requirements such as integrity, message authentication and non-repudiation. In WSNs, these functions are also used to preserve sensor nodes' identi...
Keywords:
-
Correction
-
Source
-
Cite
-
Save
0
References
0
Citations
NaN
KQI