Search
Search Results
-
On the complexity of the herding attack and some related attacks on hash functions
In this article, we analyze the complexity of the construction of the 2 k -diamond structure proposed by Kelsey and Kohno (LNCS, Vol 4004, pp 183–200,
-
Random key predistribution for wireless sensor networks using deployment knowledge
We consider a key distribution scheme for wireless sensor networks which uses deployment knowledge. Deployment is modeled as a grid of hexagonal...