2018
DOI: 10.14445/22315381/ijett-v56p202
|View full text |Cite
|
Sign up to set email alerts
|

Securing Wireless Sensor Networks Using Elliptic Curve Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…3 [2], 16 [28],22 [29] A description of the data limit is given in paper no. 2 [3], 3 [8], 12 [21], 13 [22], 21 [30] Shifting operations have been used in paper no. 1 [1], 2 [3], 19 [31] 150 kb.txt 0:00:06 28 kb.txt 0:00:02…”
Section: Can Encrypt Messages As Well As Filesmentioning
confidence: 99%
“…3 [2], 16 [28],22 [29] A description of the data limit is given in paper no. 2 [3], 3 [8], 12 [21], 13 [22], 21 [30] Shifting operations have been used in paper no. 1 [1], 2 [3], 19 [31] 150 kb.txt 0:00:06 28 kb.txt 0:00:02…”
Section: Can Encrypt Messages As Well As Filesmentioning
confidence: 99%