-
1
-
-
0142103313
-
Security and Privacy in Sensor Networks
-
Chan H, Perrig A. Security and Privacy in Sensor Networks, IEEE Computer, 2003, 36(10): 103-105.
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
2
-
-
4243082091
-
Security in Wireless Sensor Networks
-
Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks. Communications of the ACM, 2004, 47(6), 53-57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
3
-
-
34548159529
-
-
Gura N, Patel A, Wander A, H. Hberle & Chang Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. CHES, August 2004: 11-13.
-
Gura N, Patel A, Wander A, H. Hberle & Chang Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. CHES, August 2004: 11-13.
-
-
-
-
4
-
-
33646581008
-
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. Pervasive Computing and Communications [C] // 2005. PerCom 2005
-
March
-
Wander A S, Gura N, Eberle H, Gupta V, Shantz SC. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. Pervasive Computing and Communications [C] // 2005. PerCom 2005, Third IEEE International Conference on8-12 March 2005: 324-328.
-
(2005)
Third IEEE International Conference on8-12
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
6
-
-
20344381294
-
-
Malan D J, Welsh M, and Smith M D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, October 2004.
-
Malan D J, Welsh M, and Smith M D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, October 2004.
-
-
-
-
7
-
-
26644435250
-
-
Shnayder V, Hempstead M, Chen B, Allen G W, and Welsh M Simulating the Power Consumption of Large-Scale Sensor Network Applications[C]//Proceedings of the 2nd International Conference on Embedded Networked Sensor System, Baltimore, MD, USA, November3-5, 2004: 188-200.
-
(2004)
Simulating the Power Consumption of Large-Scale Sensor Network Applications[C]//Proceedings of the 2nd International Conference on Embedded Networked Sensor System, Baltimore, MD, USA, November3-5
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.3
Allen, G.W.4
Welsh, M.5
-
8
-
-
34548174739
-
-
Eastlake D and Jones P. Us Secure Hash Algorithm 1 (SHA1) [C]// IETF RFC 3174, September 2001.
-
Eastlake D and Jones P. Us Secure Hash Algorithm 1 (SHA1) [C]// IETF RFC 3174, September 2001.
-
-
-
-
9
-
-
34548157787
-
-
Madiraju, Mallanda S, Kannan C, Durresi R, Iyengar A, S. S. EBRP: Energy Band Based Routing Protocol for Wireless Sensor Networks . Intelligent Sensors[C]//Sensor Networks and Information Processing Conference, 2004. Proceedings of the 2004, 14-17 Dec. 2004: 67-71.
-
Madiraju, Mallanda S, Kannan C, Durresi R, Iyengar A, S. S. EBRP: Energy Band Based Routing Protocol for Wireless Sensor Networks . Intelligent Sensors[C]//Sensor Networks and Information Processing Conference, 2004. Proceedings of the 2004, 14-17 Dec. 2004: 67-71.
-
-
-
-
10
-
-
8344262333
-
-
Wenliang Du; Jing Deng, Han Y S, Shigang Chen; Varshney, P. K. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge [C]// INFOCOM 2004, Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies 1, March 2004: 7-11.
-
Wenliang Du; Jing Deng, Han Y S, Shigang Chen; Varshney, P. K. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge [C]// INFOCOM 2004, Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies Volume 1, March 2004: 7-11.
-
-
-
|