-
1
-
-
16244364260
-
-
March, MIT Laboratory for Computer Science, Online, Available
-
R.L. Rivest. (1997, March). The RC5 Encryption Algorithm. MIT Laboratory for Computer Science. [Online]. Available: http://theorv.lcs.mit.edu/~rivest/ Rivest-rc5rev.pdf
-
(1997)
The RC5 Encryption Algorithm
-
-
Rivest, R.L.1
-
2
-
-
34547328785
-
KILAVI Wireless Communication Protocol for the Building Environment - Network Issues
-
St. Petersburg, Russia, June 29-July 1
-
th IEEE International Symposium of Consumer Electronics (ISCE2006), St. Petersburg, Russia, June 29-July 1, 2006.
-
(2006)
th IEEE International Symposium of Consumer Electronics (ISCE2006)
-
-
Soini, M.1
Sikkila, H.2
Sydanheimo, L.3
Kivikoski, M.4
-
3
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D.Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," in 7th Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), pp. 189-199, July 2001.
-
(2001)
7th Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
4
-
-
33646918331
-
Evaluation of Security Mechanisms in Wireless Sernsor Networks
-
August
-
G. Guimaraes, E. Souto, D. Sadok, and J. Kelner, "Evaluation of Security Mechanisms in Wireless Sernsor Networks," in Proceedings of the System Communications 2005, pp. 428-433, August 2005.
-
(2005)
Proceedings of the System Communications 2005
, pp. 428-433
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
5
-
-
3042663696
-
A Key-Distribution Scheme for Wireless Home Automation Networks
-
January
-
A. Wacker, T. Heiber, and H Cermann, "A Key-Distribution Scheme for Wireless Home Automation Networks," in Consumers Communications and Networking Conference, pp. 47-52, January 2004.
-
(2004)
Consumers Communications and Networking Conference
, pp. 47-52
-
-
Wacker, A.1
Heiber, T.2
Cermann, H.3
-
7
-
-
84883897746
-
A Low-Energy Key Management Protocol for Wireless Sensor Networks
-
G. Jolly, M.C. Kuşçu, P. Kokate, and M. Younis, "A Low-Energy Key Management Protocol for Wireless Sensor Networks," in IEEE International Symposium on Computers and Communication, pp. 335-340, 2003.
-
(2003)
IEEE International Symposium on Computers and Communication
, pp. 335-340
-
-
Jolly, G.1
Kuşçu, M.C.2
Kokate, P.3
Younis, M.4
-
9
-
-
34547353845
-
-
B.S. Kaliski and Y.L. Yin, 1998, September, On the Security of the RC5 Encryption. Algorithm. RSA Laboratories Technical. Report TR-602 Version 1.0, Online, Available
-
B.S. Kaliski and Y.L. Yin. (1998, September). On the Security of the RC5 Encryption. Algorithm. RSA Laboratories Technical. Report TR-602 Version 1.0. [Online]. Available: http://grc.com/r&d/rc5-report.pdf
-
-
-
-
11
-
-
0003855464
-
Applied Cryptography: Protocols, algorithms, and source code in C
-
2nd Ed, John Wiley & Sons, Inc
-
B. Schneier, Applied Cryptography: protocols, algorithms, and source code in C, 2nd Ed. United States of America: John Wiley & Sons, Inc., 1996.
-
(1996)
United States of America
-
-
Schneier, B.1
-
13
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 197-213, May 2003.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
15
-
-
0017018484
-
New Directions in Cryptography
-
November
-
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-645, November 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-645
-
-
Diffie, W.1
Hellman, M.E.2
-
16
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
February
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communication of the ACM, Vol. 21, No. 2, pp. 120-126, February 1978.
-
(1978)
Communication of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
20344392154
-
Benchmarking Block Ciphers for Wireless Sensor Networks
-
October
-
Y.W. Law, J. Doumen, and P. Hartel, "Benchmarking Block Ciphers for Wireless Sensor Networks," in IEEE International Conference on Mobile Ad-hoc and Sensor Systems, pp. 407-456, October 2004.
-
(2004)
IEEE International Conference on Mobile Ad-hoc and Sensor Systems
, pp. 407-456
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
19
-
-
34547343921
-
-
ZigBee Alliance. ZigBee specification, versio 1.0. ZigBee Standards Organization, 205. 378 pp.
-
ZigBee Alliance. ZigBee specification, versio 1.0. ZigBee Standards Organization, 205. 378 pp.
-
-
-
|