Other formats:
BibTeX
LaTeX
RIS
@inproceedings{1198042, author = {Jurnečka, Filip and Stehlík, Martin and Matyáš, Václav}, address = {Switzerland}, booktitle = {Security and Trust Management}, doi = {http://dx.doi.org/10.1007/978-3-319-11851-2_16}, editor = {Mauw, Sjouke and Jensen, Christian Damsgaard}, keywords = {key management scheme; wireless sensor networks; evaluation; simulation}, howpublished = {elektronická verze "online"}, language = {eng}, location = {Switzerland}, isbn = {978-3-319-11850-5}, pages = {198-203}, publisher = {Springer International Publishing}, title = {Evaluation of key management schemes in wireless sensor networks}, url = {http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16}, year = {2014} }
TY - JOUR ID - 1198042 AU - Jurnečka, Filip - Stehlík, Martin - Matyáš, Václav PY - 2014 TI - Evaluation of key management schemes in wireless sensor networks PB - Springer International Publishing CY - Switzerland SN - 9783319118505 KW - key management scheme KW - wireless sensor networks KW - evaluation KW - simulation UR - http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16 L2 - http://link.springer.com/chapter/10.1007%2F978-3-319-11851-2_16 N2 - Evaluation of key management schemes is usually done analytically and by hand. As such, it is prone to mistakes and often focuses only on selected aspects of the schemes. In this paper we introduce our simulation framework for automated evaluation of key management schemes for wireless sensor networks. This framework contains a starting library of key management schemes. ER -
JURNEČKA, Filip, Martin STEHLÍK and Václav MATYÁŠ. Evaluation of key management schemes in wireless sensor networks. In Mauw, Sjouke and Jensen, Christian Damsgaard. \textit{Security and Trust Management}. Switzerland: Springer International Publishing, 2014. p.~198-203. ISBN~978-3-319-11850-5. doi:10.1007/978-3-319-11851-2\_{}16.
|