共 50 条
- [21] Message-Recovery Attacks on Feistel-Based Format Preserving Encryption CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 444 - 455
- [22] Security technology of a wireless sensor network based on chaotic encryption ENERGY SCIENCE AND APPLIED TECHNOLOGY (ESAT 2016), 2016, : 623 - 627
- [23] The Smart Home Security System Based on Wireless Sensor Network ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 1490 - 1493
- [24] Security architecture based on immunity principle for wireless sensor network Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (SUPPL. 2): : 197 - 200
- [25] Intelligent Security System based on Wireless Sensor Network Technology 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 157 - 159
- [27] Security and application of wireless sensor network PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 486 - 492
- [29] An Security Algorithm for Wireless Sensor Network 2011 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE (ICMI 2011), PT 1, 2011, 3 : 96 - 101
- [30] Security Issues in Wireless Sensor Network INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 39 - 44