Cited By
View all- Kutyłowski MSyga PYung M(2021)Emerging Security Challenges for Ubiquitous DevicesSecurity of Ubiquitous Computing Systems10.1007/978-3-030-10591-4_1(3-18)Online publication date: 15-Jan-2021
- Meena USharma A(2018)Secure Key Agreement with Rekeying Using FLSO Routing Protocol in Wireless Sensor NetworkWireless Personal Communications: An International Journal10.1007/s11277-018-5755-9101:2(1177-1199)Online publication date: 1-Jul-2018
- Karthik K(2015)Key search and adaptation based on association rules for backward secrecy2015 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS.2015.7368582(1-6)Online publication date: Nov-2015