Open Access
ITM Web Conf.
Volume 22, 2018
The Third International Conference on Computational Mathematics and Engineering Sciences (CMES2018)
Article Number 01005
Number of page(s) 5
Published online 17 October 2018
  1. C-Y. Chong, S.P. Kumar, “Sensor Networks : Evolution, opportunities, and challenges”, Proc IEEE, 91(8), 1247-1256, (2003). [CrossRef] [Google Scholar]
  2. M. Dener, “Security Analysis in Wireless Sensor Networks”, International Journal of Distrubuted Sensor Networks, 2014, Article ID 303501, 1-9, (2014). [Google Scholar]
  3. R. Lin, Z. Wang, Y. Sun, “Energy Efficient Medium Access Control Protocols for Wireless Sensor Networks and Its State-of-Art”, IEEE, pp 669-674, (2004). [Google Scholar]
  4. I.F. Akyıldız, W. Su, Y. Sankarasubramaniam, E. Çayırcı, “A survey on sensor networks”, IEEE Communications Magazine, 40(8), 102-114, (2002). [Google Scholar]
  5. T. Kavitha, D. Sridharan, “Security Vulnerabilities in Wireless Sensor Networks: A Survey”, Journal of Information Assurance and Security, 5, 31-44, (2010). [Google Scholar]
  6. C. Karlof, N. Sastry, D. Wagner, “Tinysec: a link layer security architecture for wireless sensor networks”, In n: SenSys ’04: Proceedings of the 2nd international conference on Embedded Networked Sensor Systems, 1008, 162-175, ACM, New York, USA, (2004). [CrossRef] [Google Scholar]
  7. D. Wheeler, R.M. Needham, “XXTEA: Corrections to XTEA”, Technical report, Computer Laboratory, University of Cambridge, (1998). [Google Scholar]
  8. D. Joan, R. Vincent, “The Design of Rijndael”, Springer-Verlag New York, Inc., Secaucus, NJ, USA, (2002). [Google Scholar]
  9. M. Tektaş, F. Baba, E.M. Çalışkan, “Classification of Cryptographic Algorithms and a Credit Card Application”, Third International Advanced Technologies Symposium, Ankara, (2003). [Google Scholar]
  10. H. Kodaz, “Encryption for Security in Data Transmission”, Selçuk University, Graduate School of Natural and Applied Sciences, Master Thesis, (2002). [Google Scholar]
  11. C.J. Devesh, R.P. Dhiren, S.D. Kankar, “Investigating and Analyzing the Light-weight ciphers for Wireless Sensor Networks”, Journal of Computer Science, (2009). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.