-
1
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R.: SPINS: Security protocols for sensor networks. Journal of Wireless Networks 8, 521-534 (2002)
-
(2002)
Journal of Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
-
2
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
Berkeley, pp, IEEE Computer Society Press, Los Alamitos
-
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of the 2003 IEEE Symp. on Security and Privacy, Berkeley, pp. 197-213. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proc. of the 2003 IEEE Symp. on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
33646569085
-
Sizzle: A standards-based endto-end security architecture for the embedded internet
-
Kauai, March, 2005
-
Gupta, V., Millard, M., Fung, S., Zhu, Y., et al.: Sizzle: A standards-based endto-end security architecture for the embedded internet. In: Proc. PerCom 2005, Kauai, March, 2005, pp. 247-256 (2005)
-
(2005)
Proc. PerCom
, pp. 247-256
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
-
4
-
-
11444266067
-
Wave leader election protocol for wireless sensor networks
-
Delft, the Netherlands, December
-
Dulman, S., Havinga, P., Jurink, J.: Wave leader election protocol for wireless sensor networks. In: MMSA Workshop, Delft, the Netherlands, December, 2002 (2002)
-
(2002)
MMSA Workshop
-
-
Dulman, S.1
Havinga, P.2
Jurink, J.3
-
5
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
NewYork, November
-
Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proc. of SenSys'03, NewYork, November, 2003, pp. 255-265 (2003)
-
(2003)
Proc. of SenSys'03
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
6
-
-
0030577321
-
A New Privacy Homomorphism and Applications
-
Domingo-Ferrer, J.: A New Privacy Homomorphism and Applications. Information Processing Letters 60(5), 277-282 (1996)
-
(1996)
Information Processing Letters
, vol.60
, Issue.5
, pp. 277-282
-
-
Domingo-Ferrer, J.1
-
7
-
-
34547354244
-
CDA: Concealed data aggregation in wireless sensor networks
-
ACM Press, New York
-
Girao, J., Schneider, M., Westhoff, D.: CDA: Concealed data aggregation in wireless sensor networks. In: Proc. of the ACM Workshop on Wireless Security, ACM Press, New York (2004)
-
(2004)
Proc. of the ACM Workshop on Wireless Security
-
-
Girao, J.1
Schneider, M.2
Westhoff, D.3
-
9
-
-
19544371318
-
LOCI: Local Clustering Service for Large Scale Wireless Sensor Networks
-
Technical Report OSU-CISRC-2/03-TR07
-
Mittal, V., Demirbas, M., Arora, A.: LOCI: Local Clustering Service for Large Scale Wireless Sensor Networks. Technical Report OSU-CISRC-2/03-TR07 (2003)
-
(2003)
-
-
Mittal, V.1
Demirbas, M.2
Arora, A.3
-
10
-
-
38149074470
-
-
An, L, Panos, K, Ning, P, TinyECC: Elliptic Curve Cryptography for Sensor Networks Version 0.3, Febraury 2007
-
An, L., Panos, K., Ning, P.: TinyECC: Elliptic Curve Cryptography for Sensor Networks (Version 0.3) (Febraury 2007), http://discovery.csc.ncsu.edu/ software/TinyECC/
-
-
-
-
11
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, CA, October, IEEE Computer Society Press, Los Alamitos
-
Malan, D.J., Welsh, M., Smith, M.D: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proc. of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, October, 2004, pp. 71-80. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proc. of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
12
-
-
49949083706
-
Elliptic Curve Cryptography Based Access Control in Sensor Networks
-
Haodong, W., Bo, S., Qun, L.: Elliptic Curve Cryptography Based Access Control in Sensor Networks. International Journal of Security and Networks , 127-137 (2006)
-
(2006)
International Journal of Security and Networks
, pp. 127-137
-
-
Haodong, W.1
Bo, S.2
Qun, L.3
-
13
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proc. of the 2004 Workshop on Cryptographic Hardware and Embedded Systems, pp. 119-132 (2004)
-
(2004)
Proc. of the 2004 Workshop on Cryptographic Hardware and Embedded Systems
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
-
15
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
IEEE Computer Society Press, Los Alamitos
-
Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proc. of the 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 71-80. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proc. of the 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON
, pp. 71-80
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
|