-
1
-
-
0010689456
-
Some related article I wrote
-
January
-
I. M. Author. Some related article I wrote. Some Fine Journal, 99(7):1-100, January 1999.
-
(1999)
Some Fine Journal
, vol.99
, Issue.7
, pp. 1-100
-
-
Author, I.M.1
-
2
-
-
49249098154
-
-
A. N. Expert. A Book He Wrote. His Publisher, Erewhon, NC, 1999.
-
A. N. Expert. A Book He Wrote. His Publisher, Erewhon, NC, 1999.
-
-
-
-
3
-
-
0029697680
-
A security policy model for clinical information systems
-
Oakland, CA, May
-
R. J. Anderson. A security policy model for clinical information systems. IEEE Symposium on Security and Privacy, pp. 34-48, Oakland, CA, May 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 34-48
-
-
Anderson, R.J.1
-
4
-
-
28744455779
-
Revisiting publickey cryptography for wireless sensor networks
-
B. Arazi, I. Elhanany, O. Arazi, and H. Qi. Revisiting publickey cryptography for wireless sensor networks. IEEE Computer 38(11):103-105, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.11
, pp. 103-105
-
-
Arazi, B.1
Elhanany, I.2
Arazi, O.3
Qi, H.4
-
5
-
-
49249085670
-
-
Atmega128(1) - 8-bit AVR microcontroller with 128k bytes in-system programmable flash, datasheet, ATMEL Corporation, 2006.
-
Atmega128(1) - 8-bit AVR microcontroller with 128k bytes in-system programmable flash, datasheet, ATMEL Corporation, 2006.
-
-
-
-
6
-
-
33750286059
-
Power aware design of an elliptic curve coprocessor for 8 bit platforms
-
Mar
-
G. Bertoni, L. Breveglieri, and M. Venturi. Power aware design of an elliptic curve coprocessor for 8 bit platforms. PerCom 2006 Workshops, Mar. 2006.
-
(2006)
PerCom 2006 Workshops
-
-
Bertoni, G.1
Breveglieri, L.2
Venturi, M.3
-
7
-
-
0346236349
-
-
Art and Science. Pearson Education, Inc, Boston, MA
-
M. Bishop. Computer Security - Art and Science. Pearson Education, Inc., Boston, MA, 2003.
-
(2003)
Computer Security
-
-
Bishop, M.1
-
9
-
-
84962855303
-
Workload characterization of elliptic curve cryptography and other network security for constrained environments
-
A. Fiskiran and R. Lee. Workload characterization of elliptic curve cryptography and other network security for constrained environments. WWC-5, pages 127-137, 2002.
-
(2002)
WWC-5
, pp. 127-137
-
-
Fiskiran, A.1
Lee, R.2
-
10
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
G. Gaubatz, J.-P. Kaps, E. Ozturk, and S. B. State of the art in ultra-low power public key cryptography for wireless sensor networks. PerCom 2005 Workshops, pages 146-150, 2005.
-
(2005)
PerCom 2005 Workshops
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.-P.2
Ozturk, E.3
B, S.4
-
11
-
-
77953850023
-
TinySA: A security architecture for wireless sensor networks
-
J. Großschädl. TinySA: A security architecture for wireless sensor networks. In Proceedings of CoNEXT 2006, 2006.
-
(2006)
Proceedings of CoNEXT 2006
-
-
Großschädl, J.1
-
13
-
-
49249084440
-
-
IEEE. Wireless MAC and PHY specifications for low rate WPAN. IEEE Std 802.15.4-2006, IEEE, New York, NY, 2006.
-
IEEE. Wireless MAC and PHY specifications for low rate WPAN. IEEE Std 802.15.4-2006, IEEE, New York, NY, 2006.
-
-
-
-
14
-
-
49249085998
-
-
TelosB mote platform datasheet. mote datasheet, CrossBow Technology, 2006.
-
TelosB mote platform datasheet. mote datasheet, CrossBow Technology, 2006.
-
-
-
-
15
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
D. J. Malan, M. Welsh, and M. D. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. SECON 2004, pages 71-80, 2004.
-
(2004)
SECON 2004
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
16
-
-
49249122302
-
-
Moteiv. tmote_sky low power wireless sensor module, 2006
-
Moteiv. tmote_sky low power wireless sensor module, 2006.
-
-
-
-
17
-
-
0003508562
-
-
NIST, US Department of Commerce, Gaithersburg, MD
-
NIST. Digital Signature Standard. US Department of Commerce, Gaithersburg, MD, 1994.
-
(1994)
Digital Signature Standard
-
-
-
19
-
-
0003855464
-
-
John Wiley & Sons, Inc, New York, N.Y, 2nd edition
-
B. Schneier. Applied Cryptography. John Wiley & Sons, Inc., New York, N.Y., 2nd edition, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
20
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Mar
-
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz. Energy analysis of public-key cryptography for wireless sensor networks. PerCom 2005, pp. 324-328, Mar. 2005.
-
(2005)
PerCom 2005
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
|