-
1
-
-
33750355266
-
-
Crossbow website. http://www.xbow.com.
-
-
-
-
2
-
-
33750340496
-
-
Tmote. http://www.moteiv.com.
-
-
-
-
3
-
-
33847255502
-
Practical study of transitory master key establishment for wireless sensor networks
-
Athens, Greece, September
-
J. Deng, R. Han, and S. Mishra. Practical study of transitory master key establishment for wireless sensor networks. In 1st IEEE/CreateNet Conference on Security and Privacy in Communication Networks (SecureComm 2005), pages 289-299, Athens, Greece, September 2005.
-
(2005)
1st IEEE/CreateNet Conference on Security and Privacy in Communication Networks (SecureComm 2005)
, pp. 289-299
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
4
-
-
0346739133
-
Fast and secure distributed read-only file system
-
K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. Computer Systems, 20(1): 1-24, 2002.
-
(2002)
Computer Systems
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kaashoek, M.F.2
Mazières, D.3
-
5
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
Kauai Island, Hawaii, USA, March
-
G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar. State of the art in ultra-low power public key cryptography for wireless sensor networks. In 2nd IEEE International Workshop on Pervasive Computing and Communication Security, Kauai Island, Hawaii, USA, March 2005.
-
(2005)
2nd IEEE International Workshop on Pervasive Computing and Communication Security
-
-
Gaubatz, G.1
Kaps, J.-P.2
Ozturk, E.3
Sunar, B.4
-
6
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Kauai Island, Hawaii, USA, March
-
V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. C. Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In 3rd Annual IEEE International Conference on Pervarsive Computing and Communications, Kauai Island, Hawaii, USA, March 2005.
-
(2005)
3rd Annual IEEE International Conference on Pervarsive Computing and Communications
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Shantz, S.C.8
-
7
-
-
27244436587
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Cambridge, Boston, USA, August
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz. Comparing elliptic curve cryptography and rsa on 8-bit cpus. In 6th International Workshop on Cryptographic Hardware and Embedded Systems(CHES'04), Cambridge, Boston, USA, August 2004.
-
(2004)
6th International Workshop on Cryptographic Hardware and Embedded Systems(CHES'04)
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
9
-
-
24944508408
-
Distillation codes and applications to dos resistant multicast authentication
-
San Diego, CA, USA, February
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. Tygar. Distillation codes and applications to dos resistant multicast authentication. In the 11th Annual Network and Distributed Systems Security Symposium (NDSS 2004), San Diego, CA, USA, February 2004.
-
(2004)
11th Annual Network and Distributed Systems Security Symposium (NDSS 2004)
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.5
-
12
-
-
0035752112
-
The BiBa one-time signature and broadcast authentication protocol
-
Philadelphia, PA, USA, November
-
A. Perrig. The BiBa one-time signature and broadcast authentication protocol. In 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001.
-
(2001)
8th ACM Conference on Computer and Communications Security
-
-
Perrig, A.1
-
13
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. Spins: Security protocols for sensor networks. Wireless Networks Journal(WINET), 8(5):521-534, September 2002.
-
(2002)
Wireless Networks Journal(WINET)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
14
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
Washington, DC, USA, October
-
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: Securing sensor networks with public key technology. In 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA, October 2004.
-
(2004)
2004 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
-
Watro, R.1
Kong, D.2
Fen Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
|