z-logo
open-access-imgOpen Access
Comparative Analysis of Energy Usage of Hash Functions in Secured Wireless Sensor Networks
Author(s) -
Henry NunooMensah,
Kwame Osei Boateng,
James Dzisi Gadze
Publication year - 2015
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/19233-0968
Subject(s) - computer science , hash function , cryptographic hash function , hash chain , wireless sensor network , node (physics) , computer network , sha 2 , secure hash algorithm , authentication (law) , message authentication code , hash based message authentication code , merkle tree , computer security , cryptography , structural engineering , engineering

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here