-
1
-
-
0001853125
-
The computer for the 21st century
-
Sept.
-
M. Weiser, "The Computer for the 21st Century", Sci. Amer., Sept., 1991
-
(1991)
Sci. Amer.
-
-
Weiser, M.1
-
2
-
-
0037341461
-
Pervasive computing: A paradigm for the 21st century
-
IEEE Computer Society Press, March
-
2. D. Saha, A. Mukherjee, Pervasive Computing: A Paradigm for the 21st Century, IEEE Computer, IEEE Computer Society Press, pp. 25-31, March 2003.
-
(2003)
IEEE Computer
, pp. 25-31
-
-
Saha, D.1
Mukherjee, A.2
-
3
-
-
0034445661
-
System architecture directions for networked sensors
-
November
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors", in Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, November 2000.
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
4
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Conference on Computer and Communications Security, Washington, DC, USA, April
-
Laurent Eschenauer and Virgil D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks", Conference on Computer and Communications Security. Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, pp. 41-47, April 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
5
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Adrian Perrig and Robert Szewczyk et al. "SPINS: Security Protocols for Sensor Networks," Wireless Networks, Vol.8, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
-
6
-
-
85180532806
-
Efficient distribution of keychain commitments for broadcast authentication in distributed sensor networks
-
San Diego, California, February
-
Donggang Liu and Peng Ning, "Efficient Distribution of KeyChain Commitments for Broadcast Authentication in Distributed Sensor Networks", the 10th Annual Network and Distributed System Security Symposium Conference, San Diego, California, pp. 263-276, February 2003.
-
(2003)
The 10th Annual Network and Distributed System Security Symposium Conference
, pp. 263-276
-
-
Liu, D.1
Ning, P.2
-
7
-
-
0141733111
-
Secure sensor networks for perimeter protection
-
November
-
Sasikanth Avancha, Jeffery Undercoffer, Anupam Joshi and John Pinkston, "Secure sensor networks for perimeter protection", Computer Networks: The International Journal of Computer and Telecommunications Networking archive Volume 43, Issue 4, pp. 421-435 November 2003.
-
(2003)
Computer Networks: the International Journal of Computer and Telecommunications Networking Archive
, vol.43
, Issue.4
, pp. 421-435
-
-
Avancha, S.1
Undercoffer, J.2
Joshi, A.3
Pinkston, J.4
-
8
-
-
15744373467
-
-
smartdust. http://www.cs.berkeley.edu/~awoo/smartdust/
-
-
-
-
9
-
-
15744382824
-
-
TinyOS. http://webs.cs.berkeley.edu/tos/.
-
-
-
-
10
-
-
84994869893
-
A software-optimized encryption algorithm
-
Springer-Verlag
-
P. Rogaway and D. Coppersmith, "A Software-Optimized Encryption Algorithm", Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, pp. 56-63, 1994.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop Proceedings
, pp. 56-63
-
-
Rogaway, P.1
Coppersmith, D.2
-
12
-
-
84944076741
-
Analysis methods for alleged RC4
-
Advances in Cryptology, Proceedings of ASIACRYPT'98, K. Ohta, D. Pei, Eds., Springer-Verlag, October
-
L.R. Knudsen, W. Meier, B. Preneel, V. Rijmen and S. Verdoolaege, "Analysis Methods for Alleged RC4", Advances in Cryptology, Proceedings of ASIACRYPT'98, LNCS 1514, K. Ohta, D. Pei, Eds., Springer-Verlag, pp 327-341, October 1998.
-
(1998)
LNCS
, vol.1514
, pp. 327-341
-
-
Knudsen, L.R.1
Meier, W.2
Preneel, B.3
Rijmen, V.4
Verdoolaege, S.5
-
13
-
-
84948990100
-
The RC5 encryption algorithm
-
Fast Software Encryption, Springer-Verlag
-
R.L. Rivest, "The RC5 encryption algorithm", Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, Springer-Verlag, pp. 86-96, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 86-96
-
-
Rivest, R.L.1
-
14
-
-
27544489993
-
TEA, a tiny encryption algorithm
-
Springer LNCS
-
Roger Needham and David Wheeler, "TEA, a Tiny Encryption Algorithm", Fast Software Encryption: Second International Workshop, Springer LNCS, Vol. 1008, pp. 14-16, 1994.
-
(1994)
Fast Software Encryption: Second International Workshop
, vol.1008
, pp. 14-16
-
-
Needham, R.1
Wheeler, D.2
-
15
-
-
0006540774
-
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
-
Beijing, Springer-Verlag, November
-
John Kelsey, Bruce Schneier, and David Wagner, "Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA", International Conference on Information and Communications Security, Beijing, Springer-Verlag, pp. 233-246, November 1997.
-
(1997)
International Conference on Information and Communications Security
, pp. 233-246
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
16
-
-
15744395962
-
-
Computer Laboratory Cambridge University
-
Roger Needham and David Wheeler, TEA Extension, Computer Laboratory Cambridge University, 1996. http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw- rmn-tea.html.
-
(1996)
TEA Extension
-
-
Needham, R.1
Wheeler, D.2
-
17
-
-
1542265638
-
US secure hash algorithm 1 (SHA1)
-
September
-
D. Eastlake and P. Jones. "US Secure Hash Algorithm 1 (SHA1)", IETF RFC 3174, September 2001. ftp://ftp.rfceditor.org/in-notes/rfc3174.txt
-
(2001)
IETF RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, v. 21, n. 2, pp. 120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|