-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102-116, Aug. 2002.
-
(2002)
IEEE Commun. Mag
, vol.40
, Issue.8
, pp. 102-116
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
5444275208
-
Wireless sensor and actor networks: Research challenges
-
I. Akyildiz and I. Kasimoglu, "Wireless sensor and actor networks: Research challenges," Ad Hoc Networks, vol. 2, no. 8, pp. 351-367, 2004.
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.8
, pp. 351-367
-
-
Akyildiz, I.1
Kasimoglu, I.2
-
3
-
-
0032074435
-
Self-powered signal processing using vibration-based power generation
-
R. Amirtharajah and A. Chandrakasan, "Self-powered signal processing using vibration-based power generation," IEEE J. Solid-State Circuits, vol. 33, pp. 687-695, 1998.
-
(1998)
IEEE J. Solid-State Circuits
, vol.33
, pp. 687-695
-
-
Amirtharajah, R.1
Chandrakasan, A.2
-
4
-
-
33847003127
-
An high-speed ECC-based wireless authentication protocol on an ARM microprocessor
-
M. Aydos, T. Yanik, and C. Koc. "An high-speed ECC-based wireless authentication protocol on an ARM microprocessor," in Proc. 16th Computer Security Applications Conf., 2000, pp. 401-409.
-
(2000)
Proc. 16th Computer Security Applications Conf
, pp. 401-409
-
-
Aydos, M.1
Yanik, T.2
Koc, C.3
-
5
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Proc. CRYPTO'02, Springer-Verlag
-
P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Proc. CRYPTO'02, Ser. LNCS, vol. 2442, pp. 354-368, Springer-Verlag, 2002.
-
(2002)
Ser. LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Bynn, B.3
Scott, M.4
-
6
-
-
35048900981
-
On the selection of pairing-friendly groups in selected areas in cryptography
-
Proc. SAC'03, Springer-Verlag
-
P. Barreto, B. Lynn, and M. Scott, "On the selection of pairing-friendly groups in selected areas in cryptography," in Proc. SAC'03, Ser: LNCS, vol. 3006, pp. 17-25, Springer-Verlag, 2004.
-
(2004)
Ser: LNCS
, vol.3006
, pp. 17-25
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
7
-
-
36248958414
-
-
G. Bertoni, L. Chen, P. Fragneto, K. Harrison, and G. Pelosil, Computing tate pairing on smartcards, White Paper, STMicroelectronics, 2005 [Online]. Available: http://www.st.com/stonline/ products/families/smartcard/astibe.htm
-
G. Bertoni, L. Chen, P. Fragneto, K. Harrison, and G. Pelosil, "Computing tate pairing on smartcards," White Paper, STMicroelectronics, 2005 [Online]. Available: http://www.st.com/stonline/ products/families/smartcard/astibe.htm
-
-
-
-
8
-
-
84874324906
-
Identify-based encryption from the weil pairing
-
Proc. CRYPTO'01, Springer-Verlag
-
D. Boneh and M. Franklin, "Identify-based encryption from the weil pairing," in Proc. CRYPTO'01, Ser: LNCS, vol. 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
Ser: LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
13244263673
-
-
Crossbow Technology Inc, Online, Available
-
Crossbow Technology Inc, "Wireless sensor network," 2004 [Online]. Available: http://www.xbow.com/
-
(2004)
Wireless sensor network
-
-
-
11
-
-
23944459661
-
Public keys cryptography in sensor networks-Revisited
-
Aug
-
G. Gaubatz, J. Kaps, and B. Sunar, "Public keys cryptography in sensor networks-Revisited," in Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), Aug. 2004, vol. 3313, pp. 2-18.
-
(2004)
Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS)
, vol.3313
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.2
Sunar, B.3
-
12
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Aug
-
F. Hess, "Efficient identity based signature schemes based on pairings," in Proc. SAC'02, Aug. 2002, pp. 310-324.
-
(2002)
Proc. SAC'02
, pp. 310-324
-
-
Hess, F.1
-
13
-
-
0041973497
-
Packet leashes: A Defense against wormhole attacks in wireless ad hoc networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A Defense against wormhole attacks in wireless ad hoc networks," in Proc. IEEE INFOCOM, 2003, pp. 1976-1986.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
15
-
-
84858476334
-
-
Intel Corp, Online, Available
-
Intel Corp., "Intel mote 2 overview," [Online], Available: http://www.intel.com/research/downloads/imote\_overview.pdf
-
Intel mote 2 overview
-
-
-
18
-
-
27244434197
-
Efficient hardware for the tate pairing calculation in characteristic three
-
Aug./Sep
-
T. Kerins, W. Marnane, E. Popovici, and P. Barreto, " Efficient hardware for the tate pairing calculation in characteristic three," in Proc. Workshop Cryptographic Hardware Embedded Syst. (CHES'05), Aug./Sep. 2005, pp. 412-426.
-
(2005)
Proc. Workshop Cryptographic Hardware Embedded Syst. (CHES'05)
, pp. 412-426
-
-
Kerins, T.1
Marnane, W.2
Popovici, E.3
Barreto, P.4
-
19
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks," in Proc. 10th Annual Network Distributed Syst. Security Symposium (NDSS'03), 2003, pp. 263-276.
-
(2003)
Proc. 10th Annual Network Distributed Syst. Security Symposium (NDSS'03)
, pp. 263-276
-
-
Liu, D.1
Ning, P.2
-
20
-
-
85000276942
-
-
D. Liu and P. Ning, Multi-level mTESLA: Broadcast authentication for distributed sensor networks, ACM Trans. Embedded Computing Systems (TECS), 3, no. 4, pp. 800-836, 2004.
-
D. Liu and P. Ning, "Multi-level mTESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embedded Computing Systems (TECS), vol. 3, no. 4, pp. 800-836, 2004.
-
-
-
-
21
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
July
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks," in Proc. 2nd Annual International Conf. Mobile Ubiquitous Syst.: Networking Services (MobiQuitous 2005), July 2005, pp. 118-132.
-
(2005)
Proc. 2nd Annual International Conf. Mobile Ubiquitous Syst.: Networking Services (MobiQuitous 2005)
, pp. 118-132
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
22
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, S. Moulton, and M. Welsh, "Sensor networks for emergency response: challenges and opportunities," IEEE Pervasive Computing, Special Issue on Pervasive Computing for First Response, 2004, vol. 3, no. 4, pp. 16-23.
-
(2004)
IEEE Pervasive Computing, Special Issue on Pervasive Computing for First Response
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.2
Fulford-Jones, T.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Moulton, S.8
Welsh, M.9
-
23
-
-
0035242946
-
Vibration-to-electric energy conversion
-
S. Meininger, J. Mur-Miranda, R. Amirtharajah, A. Chandrakasan, and J. Lang, "Vibration-to-electric energy conversion," IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 9, pp. 64-76, 2001.
-
(2001)
IEEE Trans. Very Large Scale Integration (VLSI) Systems
, vol.9
, pp. 64-76
-
-
Meininger, S.1
Mur-Miranda, J.2
Amirtharajah, R.3
Chandrakasan, A.4
Lang, J.5
-
25
-
-
0000758345
-
Proposed Federal Information Processing Standard for Digital Signature Standard (DSS)
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology: Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register, vol. 56, no. 169, pp. 42980-42982, 1991.
-
(1991)
Federal Register
, vol.56
, Issue.169
, pp. 42980-42982
-
-
-
27
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, "SPINS: Security protocols for sensor networks," in Proc. 7th Annual International Conf. Mobile Computing Networks (MobiCom'01), July 2001, pp. 521-534.
-
(2001)
Proc. 7th Annual International Conf. Mobile Computing Networks (MobiCom'01)
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
28
-
-
36248933437
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
29
-
-
33646834914
-
A new approach for random key pre-distribution in large scale wireless sensor networks
-
K. Ren, K. Zeng, and W Lou, "A new approach for random key pre-distribution in large scale wireless sensor networks," J. Wireless Commun. Mobile Computing (WCMC), vol. 6, no. 3, pp. 307-318, 2006.
-
(2006)
J. Wireless Commun. Mobile Computing (WCMC)
, vol.6
, Issue.3
, pp. 307-318
-
-
Ren, K.1
Zeng, K.2
Lou, W.3
-
30
-
-
33749667642
-
On broadcast authentication in wireless sensor networks
-
Proc. WASA 2006, Aug
-
K. Ren, K. Zeng, W. Lou, and P. Moran, "On broadcast authentication in wireless sensor networks," in Proc. WASA 2006, LNCS, Aug. 2006, vol. 4138, pp. 502-514,.
-
(2006)
LNCS
, vol.4138
, pp. 502-514
-
-
Ren, K.1
Zeng, K.2
Lou, W.3
Moran, P.4
-
31
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp.120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
33
-
-
33750710411
-
Implementing cryptographic pairings on smartcards
-
Proc. Cryptographic Hardware Embedded Syst.-CHES 2006: 8th International Workshop, Oct
-
M. Scott, N. Costigan, and W. Abdulwahab, "Implementing cryptographic pairings on smartcards," in Proc. Cryptographic Hardware Embedded Syst.-CHES 2006: 8th International Workshop, LNCS, Oct. 2006, vol. 4249, pp. 134-147.
-
(2006)
LNCS
, vol.4249
, pp. 134-147
-
-
Scott, M.1
Costigan, N.2
Abdulwahab, W.3
-
34
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Proc. CRYPTO'84, Springer-Verlag
-
A. Shamir, "Identity based cryptosystems and signature schemes," in Proc. CRYPTO'84, Ser. LNCS, vol. 196, pp. 47-53, Springer-Verlag, 1984.
-
(1984)
Ser. LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
36
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Mar
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in 3rd IEEE International Conf. Pervasive Computing Commun. (PerCom 2005), Mar. 2005, pp. 324-328.
-
(2005)
3rd IEEE International Conf. Pervasive Computing Commun. (PerCom 2005)
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
37
-
-
24944445896
-
Batch verifications with ID-based signatures
-
H. Yoon, J. Cheon, and Y. Kim, "Batch verifications with ID-based signatures," in Proc. ICISC 2004, Ser. LNCS, 2005, vol. 3506, pp. 233-248.
-
(2005)
Proc. ICISC 2004, Ser. LNCS
, vol.3506
, pp. 233-248
-
-
Yoon, H.1
Cheon, J.2
Kim, Y.3
-
38
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms in wireless sensor networks
-
Feb
-
Y. Zhang, W. Liu, W Lou, and Y. Fang, "Location-based compromise-tolerant security mechanisms in wireless sensor networks," IEEE J. Select. Areas Commun., Special Issue Security Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006.
-
(2006)
IEEE J. Select. Areas Commun., Special Issue Security Wireless Ad Hoc Networks
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|