-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. Journal of Computer Networks, 38:393-422, 2002.
-
(2002)
Journal of Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
4444225744
-
On the performance of group key agreement protocols
-
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik. On the performance of group key agreement protocols. ACM Transactions on Information and Systems Security, 7(3):457-488, 2004.
-
(2004)
ACM Transactions on Information and Systems Security
, vol.7
, Issue.3
, pp. 457-488
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Tsudik, G.4
-
3
-
-
84981262037
-
Performance analysis of group key establishment protocols in ad hoc networks. Technical report, Universidade Federal do Rio de Janeiro, Brazil
-
Technical Report GTA-03-06
-
E. Anton and O. Duarte. Performance analysis of group key establishment protocols in ad hoc networks. Technical report, Universidade Federal do Rio de Janeiro, Brazil, 2006. Technical Report GTA-03-06.
-
(2006)
-
-
Anton, E.1
Duarte, O.2
-
4
-
-
47749105021
-
Determining the optimal configuration for the zone routing protocol
-
G. Ateniese, M. Steiner, and G. Tsudik. Determining the optimal configuration for the zone routing protocol. IEEE Journal on Selected Areas in Communications, 18(4): 1-13, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 1-13
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
7
-
-
84948991087
-
-
M. Burmester and Y Desmedt. A secure and efficient conference key distribution system. In Advances in Cryptology (EUROCRYPT 1994), pages 275-286. Springer-Verlag, 1994. Lecture Notes in Computer Science, LNCS 950.
-
M. Burmester and Y Desmedt. A secure and efficient conference key distribution system. In Advances in Cryptology (EUROCRYPT 1994), pages 275-286. Springer-Verlag, 1994. Lecture Notes in Computer Science, LNCS 950.
-
-
-
-
8
-
-
84978999296
-
Efficient and secure conference-key distribution
-
Security Protocols Workshop, Springer-Verlag
-
M. Burmester and Y. Desmedt. Efficient and secure conference-key distribution. In Security Protocols Workshop, pages 119-129. Springer-Verlag, 1996. Lecture Notes in Computer Science, LNCS 1189.
-
(1996)
Lecture Notes in Computer Science, LNCS
, vol.1189
, pp. 119-129
-
-
Burmester, M.1
Desmedt, Y.2
-
9
-
-
47749153464
-
-
I. Chatzigiannakis, E. Konstantinou, V Liagkou, and P. Spirakis. Design, analysis and performance evaluation of group key establishment in wireless sensor networks. In 2nd Workshop on Cryptography for Ad hoc Networks. Springer-Verlag, 2006. ICALP 2006 Workshop, Electronic Notes in Theoretical Computer Science.
-
I. Chatzigiannakis, E. Konstantinou, V Liagkou, and P. Spirakis. Design, analysis and performance evaluation of group key establishment in wireless sensor networks. In 2nd Workshop on Cryptography for Ad hoc Networks. Springer-Verlag, 2006. ICALP 2006 Workshop, Electronic Notes in Theoretical Computer Science.
-
-
-
-
11
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
12
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Cryptographic Hardware and Embedded Systems CHES 2004, Springer-Verlag
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Cryptographic Hardware and Embedded Systems (CHES 2004), pages 119-132. Springer-Verlag, 2004. Lecture Notes in Computer Science, LNCS 3156.
-
(2004)
Lecture Notes in Computer Science, LNCS
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
13
-
-
0024663583
-
Authenticated group key distribution scheme for a large distributed network
-
L. Harn and T. Kiesler. Authenticated group key distribution scheme for a large distributed network. In IEEE Symposium on Security and Privacy, pages 300-309, 1989.
-
(1989)
IEEE Symposium on Security and Privacy
, pp. 300-309
-
-
Harn, L.1
Kiesler, T.2
-
15
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Advances in Cryptology CRYPTO 1994, Springer-Verlag
-
J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. In Advances in Cryptology (CRYPTO 1994), pages 110-125. Springer-Verlag, 1993. Lecture Notes in Computer Science, LNCS 2729.
-
(1993)
Lecture Notes in Computer Science, LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
16
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik. Tree-based group key agreement. ACM Transactions on Information and Systems Security, 7(1):60-96, 2004.
-
(2004)
ACM Transactions on Information and Systems Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
17
-
-
18844399081
-
TOSSIM: Accurate and scalable simulation of entire tinyos applications
-
P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and scalable simulation of entire tinyos applications. In 1st ACM International Conference On Embedded Networked Sensor Systems (SENSYS 2003), pages 126-137, 2003.
-
(2003)
1st ACM International Conference On Embedded Networked Sensor Systems (SENSYS 2003)
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
20
-
-
34047111183
-
-
Crossbow Technology Inc
-
Crossbow Technology Inc. MICA2 motes, 2005. http://www.xbow.com/Products/ productsdetails.aspx?sid=72.
-
(2005)
MICA2 motes
-
-
-
22
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
V Shnayder, M. Hempstead, B. Chen, G. Allen, and M. Welsh. Simulating the power consumption of large-scale sensor network applications. In 2nd ACM International Conference on Embedded Networked Sensor Systems (SENSYS 2004), pages 188-200, 2004.
-
(2004)
2nd ACM International Conference on Embedded Networked Sensor Systems (SENSYS 2004)
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.3
Allen, G.4
Welsh, M.5
|