Security-Performance TradeoffsofInheritance: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

24 December 2023

  • curprev 16:0116:01, 24 December 2023SatoshiNakamoto talk contribs 2,022 bytes −99 No edit summary undo
  • curprev 16:0116:01, 24 December 2023SatoshiNakamoto talk contribs 2,121 bytes +2,121 Created page with "Title: Security-Performance TradeoffsofInheritance Main Research Question: How does a novel 2-Phase technique for key predistribution based on a combination of inherited and random key assignments from a given key pool impact the security and performance of sensor networks? Methodology: The researchers proposed a 2-Phase technique for key predistribution in sensor networks. In the first phase, a certain number of keys are randomly selected from a large key pool and dis..."