Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Technology | 2 |
| Telecommunications | 2 |
| Coding | 1 |
| Computer Networks | 1 |
| Computer Science | 1 |
| Computer Software | 1 |
| Computers | 1 |
| Confidentiality | 1 |
| Data | 1 |
| Engineering | 1 |
| More ▼ | |
Source
| ProQuest LLC | 2 |
Publication Type
| Dissertations/Theses -… | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Adamo, Oluwayomi – ProQuest LLC, 2011
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
Descriptors: Coding, Technology, Error Correction, Computer Software
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality

Direct link
