ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
6
views
0
references
Top references
cited by
27
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
722
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
SPINS: security protocols for sensor networks
Author(s):
A Perrig
,
R. SZEWCZYK
,
J.D. Tygar
,
V. Wen
,
D.E. Culler
,
Perrig
,
R. Szewczyk
,
D.E. Culler
,
D. Tygar
,
D. Culler
,
J Tygar
,
DE Culler
Publication date:
2002
Journal:
Wireless Netw.
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Journal of Disability Research
Author and article information
Journal
DOI::
10.1023/A:1016598314198
ScienceOpen disciplines:
Engineering
,
Biomedical engineering
Data availability:
ScienceOpen disciplines:
Engineering
,
Biomedical engineering
Comments
Comment on this article
Sign in to comment
scite_
Similar content
722
The Impact of COVID-19 Pandemic on Food Security and Food Diversity of Iranian Rural Households
Authors:
Rezvan Ghanbari Movahed
,
Fatemeh Maleki Fard
,
Saeed Gholamrezai
…
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
Authors:
Mohsen Toorani
Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey
Authors:
Yingnan Sun
,
Frank Lo
,
Benny Lo
See all similar
Cited by
26
A survey of secure middleware for the Internet of Things
Authors:
Paul Fremantle
,
Philip Scott
,
Xiaodong Wang
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks †
Authors:
Thaier Hayajneh
,
Bassam J Mohd
,
Muhammad Imran
…
S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme
Authors:
Muhammad Tanveer
,
Ghulam Abbas
,
Ziaul Haq Abbas
…
See all cited by