-
1
-
-
28744455779
-
-
B. Arazi, I. Elhahnany, H. Qi, Revisiting public-key cryptography for wireless sensor networks, IEEE Computer, 2005, pp. 103-105.
-
B. Arazi, I. Elhahnany, H. Qi, Revisiting public-key cryptography for wireless sensor networks, IEEE Computer, 2005, pp. 103-105.
-
-
-
-
2
-
-
46549083791
-
-
Atmega128(l) - 8-bit avr microcontroller with 128 k bytes in-system programmable flash. datasheet, ATMEL Corporation. , 2006.
-
Atmega128(l) - 8-bit avr microcontroller with 128 k bytes in-system programmable flash. datasheet, ATMEL Corporation. , 2006.
-
-
-
-
3
-
-
33750286059
-
-
G. Bertoni, L. Breveglieri, M. Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: Proceeding of the Fourth Annual IEEE Conference on Pervasive Computing and Communications, 2006 IEEE PERCOM 2006, 2006.
-
G. Bertoni, L. Breveglieri, M. Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: Proceeding of the Fourth Annual IEEE Conference on Pervasive Computing and Communications, 2006 IEEE PERCOM 2006, 2006.
-
-
-
-
6
-
-
84962855303
-
-
A. Fiskiran, R. Lee, Workload characterization of elliptic curve cryptography and other network security for constrained environments, in: Proceedings of IEEE International Workshop on Workload Characterization 2002, 2002, pp. 127-137.
-
A. Fiskiran, R. Lee, Workload characterization of elliptic curve cryptography and other network security for constrained environments, in: Proceedings of IEEE International Workshop on Workload Characterization 2002, 2002, pp. 127-137.
-
-
-
-
7
-
-
33646812572
-
-
G. Gaubatz, J.-P. Kaps, E. Ozturk, B. Sunar, State of the art in ultra-low power public key cryptography for wireless sensor networks, in: Proceedings of Percom 2005, 2005.
-
G. Gaubatz, J.-P. Kaps, E. Ozturk, B. Sunar, State of the art in ultra-low power public key cryptography for wireless sensor networks, in: Proceedings of Percom 2005, 2005.
-
-
-
-
8
-
-
77953850023
-
-
J. Groszschaedl, Tinysa: a security architecture for wireless sensor networks, in: Proceedings of CoNEXT 2006, 2006.
-
J. Groszschaedl, Tinysa: a security architecture for wireless sensor networks, in: Proceedings of CoNEXT 2006, 2006.
-
-
-
-
9
-
-
11244267013
-
-
Springer-Verlag, Inc., New York, NY
-
Hankerson D., Menezes A., and Vanstone S. Guide to Elliptic Curve Cryptography. first ed. (2004), Springer-Verlag, Inc., New York, NY
-
(2004)
Guide to Elliptic Curve Cryptography. first ed.
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
10
-
-
46549084397
-
-
IEEE, Wireless MAC and PHY specifications for low rate WPAN, IEEE Std 802.15.4-2006 (Revision of IEEE Std 802.15.4-2003), IEEE, New York, NY, 2006.
-
IEEE, Wireless MAC and PHY specifications for low rate WPAN, IEEE Std 802.15.4-2006 (Revision of IEEE Std 802.15.4-2003), IEEE, New York, NY, 2006.
-
-
-
-
11
-
-
46549083529
-
-
Telosb mote platform datasheet. mote datasheet, CrossBow Technology. .
-
Telosb mote platform datasheet. mote datasheet, CrossBow Technology. .
-
-
-
-
12
-
-
46549087309
-
-
tmote_sky low power wireless sensor module, Technical report, Moteiv Corporation, San Francisco, CA. , 2006.
-
tmote_sky low power wireless sensor module, Technical report, Moteiv Corporation, San Francisco, CA. , 2006.
-
-
-
-
13
-
-
20344381294
-
-
D. Malan, M. Welsh, M. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: Proceeding of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, 2004, pp. 71-80.
-
D. Malan, M. Welsh, M. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: Proceeding of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, 2004, pp. 71-80.
-
-
-
-
14
-
-
34547420699
-
-
K. Piotrowski, S. Peter, How public key cryptography influences wireless sensor node lifetime, in: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, 2006, pp. 169-176.
-
K. Piotrowski, S. Peter, How public key cryptography influences wireless sensor node lifetime, in: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, 2006, pp. 169-176.
-
-
-
-
15
-
-
0242443772
-
-
Y. Sankarasubramaniam, Ö.B. Akan, I.F. Akyildiz, ESRT: event-to-sink reliable transport in wireless sensor networks, in: Proceedings of the 4th ACM MobiHoc, Annapolis, MD, June 2003, pp. 177-188.
-
Y. Sankarasubramaniam, Ö.B. Akan, I.F. Akyildiz, ESRT: event-to-sink reliable transport in wireless sensor networks, in: Proceedings of the 4th ACM MobiHoc, Annapolis, MD, June 2003, pp. 177-188.
-
-
-
-
18
-
-
46549083752
-
-
North-Holland, Amsterdam, The Netherlands
-
Takagi H. Queueing Analysis. Vacation and Priority Systems vol. 1 (1991), North-Holland, Amsterdam, The Netherlands
-
(1991)
Vacation and Priority Systems
, vol.1
-
-
Takagi, H.1
-
19
-
-
33646581008
-
-
A. Wander, N. Gura, H. Eberle, V. Gupta, S. Chang, Energy analysis of public-key cryptography for wirless semsor networks, in: Proceeding of the Third Annual IEEE Conference on Pervasive Computing and Communications, 2005 IEEE PERCOM, 2005, pp. 324-328.
-
A. Wander, N. Gura, H. Eberle, V. Gupta, S. Chang, Energy analysis of public-key cryptography for wirless semsor networks, in: Proceeding of the Third Annual IEEE Conference on Pervasive Computing and Communications, 2005 IEEE PERCOM, 2005, pp. 324-328.
-
-
-
-
20
-
-
25844505160
-
-
M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, S. Singh, Exploiting heterogeneity in sensor networks, in: Proceedings of the INFOCOM05, vol. 2, Miami, FL, March 2005, pp. 878-890.
-
M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, S. Singh, Exploiting heterogeneity in sensor networks, in: Proceedings of the INFOCOM05, vol. 2, Miami, FL, March 2005, pp. 878-890.
-
-
-
|