Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control

  • Haodong Wang
  • , Bo Sheng
  • , Chiu C. Tan
  • , Qun Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationProceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008
Pages11-18
Number of pages8
DOIs
StatePublished - 2008
Event28th International Conference on Distributed Computing Systems, ICDCS 2008 - Beijing, China
Duration: Jul 17 2008Jul 20 2008

Publication series

NameProceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008

Conference

Conference28th International Conference on Distributed Computing Systems, ICDCS 2008
Country/TerritoryChina
CityBeijing
Period7/17/087/20/08

ASJC Scopus Subject Areas

  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control'. Together they form a unique fingerprint.

Cite this