|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
![Lens.org Logo](/images/Lens.org/lens-logo.png)
CITATIONS
Cited by 1 scholarly publication.
Sensor networks
Public-key cryptography
Information security
Binary data
Computer security
Network security
Cryptography