Amanote Research

Amanote Research

    RegisterSign In

Implementation and Analysis of Bootstrapping Protocol Using Public Key Cryptography in WSN

International Journal of Research in Engineering and Technology
doi 10.15623/ijret.2014.0304060
Full Text
Open PDF
Abstract

Available in full text

Date

April 25, 2014

Authors
Ashok Raj K .
Publisher

eSAT Publishing House


Related search

Number Theory and Public-Key Cryptography

2001English

Implementation of IMHT LEACH Protocol for WSN

HELIX
2019English

An Overview of Public Key Cryptography

IEEE Communications Society Magazine
1978English

Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2007English

Feasibility Analysis of a LoRa-Based WSN Using Public Transport

Applied System Innovation
2018English

Analysis on the Key Design and Implementation of Green Public Building

Journal of World Architecture
2017English

Symmetric Key Cryptography Using Modified DJSSA Symmetric Key Algorithm

International Journal of Scientific Research
2012English

Blowfish Cryptography Implementation by Using Microcontroller

The International Conference on Electrical Engineering
2010English

Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)

2008English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy