Random number generators: good ones are hard to find
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An image encryption algorithm based on multi-dimensional orthogonal sequence
MUSP'07 Proceedings of the 7th WSEAS International Conference on Multimedia Systems & Signal Processing
ICS'08 Proceedings of the 12th WSEAS international conference on Systems
Chaos encryption method based on large signal modulation in additive nonlinear discrete-time systems
NOLASC'06 Proceedings of the 5th WSEAS international conference on Non-linear analysis, non-linear systems and chaos
Hi-index | 0.00 |
Wireless Sensor Networks (WSN) are vulnerable to a wide set of attacks which threaten the network operation. Although communication and security technologies for computer networks have reached a mature stage, their applicability in WSNs is disputable ...