-
1
-
-
0036688074
-
A survey on sensor networks
-
PP
-
Akyildiz IF, et al. "A survey on sensor networks", IEEE Communications Magazine, 2002,40(8): PP. 102-114.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
-
2
-
-
77952532148
-
User authentication in sensor networks (extended abstract)
-
September
-
Z. Benenson, et al. "User authentication in sensor networks (extended abstract)", In Informatik 2004, Workshop on Sensor Networks, September 2004.
-
(2004)
Informatik 2004, Workshop on Sensor Networks
-
-
Benenson, Z.1
-
3
-
-
33746862074
-
An algorithmic framework for robust access control in wireless sensor networks
-
January .PP
-
Z. Benenson, et al. "An algorithmic framework for robust access control in wireless sensor networks", In Second European Workshop on Wireless Sensor Networks (EWSN), January 2005.PP.158-165.
-
(2005)
Second European Workshop on Wireless Sensor Networks (EWSN)
, pp. 158-165
-
-
Benenson, Z.1
-
4
-
-
47849087076
-
-
Z.Benenson, N. et al. Realizing Robust User Authentication in Sensor Networks, Workshop on Real-World Wireless Sensor Networks (REALWSN), Stockholm Sweden, June 2005. PP: 135-142
-
Z.Benenson, N. et al. "Realizing Robust User Authentication in Sensor Networks", Workshop on Real-World Wireless Sensor Networks (REALWSN), Stockholm Sweden, June 2005. PP: 135-142
-
-
-
-
6
-
-
33750315272
-
Authenticated Query Flooding in Sensor Networks
-
Karlstad Sweden. May, PP
-
Zinaida Benenson et al. "Authenticated Query Flooding in Sensor Networks", PerCom Workshops 2006, Karlstad Sweden. May 2006, PP. 644-647.
-
(2006)
PerCom Workshops 2006
, pp. 644-647
-
-
Benenson, Z.1
-
7
-
-
49949083706
-
Elliptic curve cryptography-based access control in sensor networks
-
December
-
Wang H. et al. "Elliptic curve cryptography-based access control in sensor networks", Int. J. Security and Networks. December 2006, pp. 127-137.
-
(2006)
Int. J. Security and Networks
, pp. 127-137
-
-
Wang, H.1
-
8
-
-
29844438193
-
Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks
-
May, Illinois USA.PP
-
Wensheng Zhang et al. "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks", MobiHoc'05, May 2005, Illinois USA.PP. 378-389
-
(2005)
MobiHoc'05
, pp. 378-389
-
-
Zhang, W.1
-
9
-
-
47849120612
-
-
C. Blundo et al. Perfectly-secure key distribution for dynamic conferences, in Advances in Cryptology CRYPTO 92, LNCS, 1993, pp. 471-486.
-
C. Blundo et al. "Perfectly-secure key distribution for dynamic conferences", in Advances in Cryptology CRYPTO 92, LNCS, 1993, pp. 471-486.
-
-
-
-
10
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Aug, Boston, MA, USA. Berlin, Germany:Springer-Verlag,PP
-
Gura, N. et al. "Comparing elliptic curve cryptography and rsa on 8-bit cpus", Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004), Aug 2004, Boston, MA, USA. Berlin, Germany:Springer-Verlag,PP. 119-132.
-
(2004)
Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES
, pp. 119-132
-
-
Gura, N.1
-
11
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
Santa Clara California, October, PP
-
D. J. Malan et al. "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography", In First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara California, October 2004. PP.71-80.
-
(2004)
First IEEE International Conference on Sensor and Ad Hoc Communications and Network
, pp. 71-80
-
-
Malan, D.J.1
-
13
-
-
4244026973
-
From euclid's gcd to Montgomery multiplication to the great divide
-
Technical Report, Sun Microsystems Laboratories, June, TR-2001-95
-
Shantz, S.C. "From euclid's gcd to Montgomery multiplication to the great divide", Technical Report, Sun Microsystems Laboratories, June 2001, TR-2001-95.
-
(2001)
-
-
Shantz, S.C.1
-
14
-
-
33646569085
-
-
Gupta, et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on (2005), pp. 247-256.
-
Gupta, et al. "Sizzle: a standards-based end-to-end security architecture for the embedded Internet ", Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on (2005), pp. 247-256.
-
-
-
|