Message Authentication in Computationally Constrained Environments
Message Authentication in Computationally Constrained Environments Abstract RFID and wireless sensor networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by […]