-
2
-
-
33646581008
-
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
-
Wander, Gura, Eberle, Gupta, Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," In Third IEEE International Conference on Pervasive Computing and Communications, Proceedings: 324-328, 2005.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications, Proceedings
, pp. 324-328
-
-
Wander1
Gura2
Eberle3
Gupta4
Shantz5
-
3
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Cryptographic Hardware and Embedded Systems (CHES) 2004, 6th International Workshop, Proceedings
-
Gura, Patel, Wander, Eberle, Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," In Cryptographic Hardware and Embedded Systems (CHES) 2004, 6th International Workshop, Proceedings (Lecture Notes in Comput. Sci. Vol.3156): 119-32, 2004.
-
(2004)
Lecture Notes in Comput. Sci
, vol.3156
, pp. 119-132
-
-
Gura1
Patel2
Wander3
Eberle4
Shantz5
-
4
-
-
11244317648
-
A Public-key Cryptographic Processor for RSA and ECC
-
Eberle, Gura, Shantz, Gupta, Rarick, "A Public-key Cryptographic Processor for RSA and ECC," In 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, Proceedings: 98-110, 2004.
-
(2004)
15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, Proceedings
, pp. 98-110
-
-
Eberle1
Gura2
Shantz3
Gupta4
Rarick5
-
6
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, California, May 11-14
-
H. Chan, A. Perrig, D. Song, "Random key predistribution schemes for sensor networks," In IEEE Symposium on Security and Privacy, pages 197-213, Berkeley, California, May 11-14 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
9
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
H.W. Chan and A. Perrig, "PIKE: peer intermediaries for key establishment in sensor networks," In IEEE Infocom 2005, Proceedings: 524-35 vol. 1 2005.
-
(2005)
IEEE Infocom 2005, Proceedings
, vol.1
, pp. 524-535
-
-
Chan, H.W.1
Perrig, A.2
-
10
-
-
29844457287
-
An Efficient Scheme for Authenticating Public Keys in Sensor Networks
-
W.L. Du, R.H. Wang, and P. Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks," In Proceeding of ACM MobiHoc, 2005, 58 67.
-
(2005)
In Proceeding of ACM MobiHoc
, pp. 58-67
-
-
Du, W.L.1
Wang, R.H.2
Ning, P.3
-
12
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Springer, p.p
-
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," LNCS 196, Advances in Cryptology: Proc. Crypto'84, Springer, p.p. 47-53.
-
(1984)
LNCS 196, Advances in Cryptology: Proc. Crypto
, pp. 47-53
-
-
Shamir, A.1
-
13
-
-
85021249308
-
Combined Public Key System
-
W. Tang, X. H. Nan, Z. Chen, "Combined Public Key System," In IEEE International Conference on Software, Telecommunications and Computer Networks, 2004 (SoftCOM'04).
-
IEEE International Conference on Software, Telecommunications and Computer Networks, 2004 (SoftCOM'04)
-
-
Tang, W.1
Nan, X.H.2
Chen, Z.3
-
14
-
-
85021232413
-
-
Vinayak Naik. Sprinkler, A Reliable and Energy Efficient Data Dissemination Service for Wireless Embedded Device, In Proc. of The 26th IEEE Real-Time Systems Symposium for Real-Time Communication and Sensor Network Track, 2005.
-
Vinayak Naik. Sprinkler, "A Reliable and Energy Efficient Data Dissemination Service for Wireless Embedded Device," In Proc. of The 26th IEEE Real-Time Systems Symposium for Real-Time Communication and Sensor Network Track, 2005.
-
-
-
-
15
-
-
0034772133
-
Geography-informed energy conservation for ad hoc routing
-
MobiCOM, Rome, Italy. July
-
Xu Y, Heidemann J, Estrin D, "Geography-informed energy conservation for ad hoc routing," In Proc. 7th Annual Int'l Conf on Mobile Computing and Networking (MobiCOM), Rome, Italy. July 2001. 70-84.
-
(2001)
Proc. 7th Annual Int'l Conf on Mobile Computing and Networking
, pp. 70-84
-
-
Xu, Y.1
Heidemann, J.2
Estrin, D.3
-
16
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
Heinzelman W R, Chandrakasan A, Balakrishnan H, "An application-specific protocol architecture for wireless microsensor networks," IEEE Transactions on Wireless Communications. 2002, 1(4): 660-670.
-
(2002)
IEEE Transactions on Wireless Communications
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
18
-
-
85021220725
-
-
Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for E_cient Cryptography Version 1.0, September 2000
-
Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for E_cient Cryptography Version 1.0, September 2000.
-
-
-
-
19
-
-
0000653210
-
Selecting Cryptographic Key Sizes
-
Lenstra, A., E. Verheul, "Selecting Cryptographic Key Sizes," Journal of Cryptology 14 (2001) 255-293.
-
(2001)
Journal of Cryptology
, vol.14
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.2
-
20
-
-
85028765277
-
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, Perfectly-secure key distribution for dynamic conferences, In Advances in Cryptology - CRYPTO '92, LNCS 740, pages 471-486, 1993.
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, "Perfectly-secure key distribution for dynamic conferences," In Advances in Cryptology - CRYPTO '92, LNCS 740, pages 471-486, 1993.
-
-
-
-
21
-
-
33646569085
-
Sizzle: A Standards-based end-to-end Security Architecture for the Embedded Internet
-
Mar
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, S. Chang Shantz, "Sizzle: A Standards-based end-to-end Security Architecture for the Embedded Internet," PerCom 2005, Mar. 2005
-
(2005)
PerCom 2005
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Chang Shantz, S.7
-
23
-
-
14844304757
-
TinyPK: Securing Sensor Networks with Public Key Technology
-
Washington, DC, USA, October 25
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, "TinyPK: Securing Sensor Networks with Public Key Technology," SASN'04, Washington, DC, USA, October 25, 2004.
-
(2004)
SASN'04
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
|