Figure 3From: Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks ROM and RAM usage of Deluge, SecDeluge, Sluice, Seluge, and PrivCIB. Back to article page