We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-2 of 2 results
  1. On the complexity of the herding attack and some related attacks on hash functions

    In this article, we analyze the complexity of the construction of the 2 k -diamond structure proposed by Kelsey and Kohno (LNCS, Vol 4004, pp 183–200,

    Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay in Designs, Codes and Cryptography
    Article 15 February 2011
  2. Random key predistribution for wireless sensor networks using deployment knowledge

    We consider a key distribution scheme for wireless sensor networks which uses deployment knowledge. Deployment is modeled as a grid of hexagonal...

    J. Jaworski, M. Ren, K. Rybarczyk in Computing
    Article 10 May 2009
Did you find what you were looking for? Share feedback.