-
2
-
-
28744455779
-
Revisiting public key cryptography for wireless sensor networks
-
Arazi, B., Elhanany, I., Arazi, O. and Qi, H. (2005) ‘Revisiting public key cryptography for wireless sensor networks’, IEEE Computer Magazine, pp.85–87.
-
(2005)
IEEE Computer Magazine
, pp. 85-87
-
-
Arazi, B.1
Elhanany, I.2
Arazi, O.3
Qi, H.4
-
3
-
-
77953904148
-
Recommendation for key management – part 1: general national institute of standards and technology
-
Barker, E., Barker, W., Burr, W. Polk, W. and Smid, M. (2005) ‘Recommendation for key management – part 1: general national institute of standards and technology’, NIST Special Publication.
-
(2005)
NIST Special Publication
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
4
-
-
3042584860
-
-
New York, Springer-Verlag
-
Boneh, D., Modadugu, N. and Kim, M. (2000) Generating RSA Keys on a Handheld using an Untrusted Server, New York, Springer-Verlag.
-
(2000)
Generating RSA Keys on a Handheld using an Untrusted Server
-
-
Boneh, D.1
Modadugu, N.2
Kim, M.3
-
5
-
-
84952972919
-
Certicom ECC challenge
-
Ceritcom (1997) ‘Certicom ECC challenge’, Certicom, Inc. Available at: http://www.certicom.com/index.php.
-
(1997)
Certicom, Inc
-
-
Ceritcom1
-
7
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Washington DC, USA
-
Chan, H., Perrig, A. and Song, D. (2003) ‘Random key predistribution schemes for sensor networks’, Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington DC, USA, pp.197–214.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197-214
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
84952954495
-
Mica 2 datasheet
-
Crossbow (2005a) ‘Mica 2 datasheet’, Crossbow Technology, Inc., Available at: http://www.xbow.com.
-
(2005)
Crossbow Technology, Inc.
-
-
Crossbow1
-
9
-
-
84952954495
-
Mica 2 datasheet
-
Crossbow (2005b) ‘Mica 2 datasheet’, Crossbow Technology, Inc., Available at: http://www.xbow.com.
-
(2005)
Crossbow Technology, Inc.
-
-
Crossbow1
-
10
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Hong Kong, China
-
Du, W., Deng, J., Han, Y.S., Chen, S. and Varshney, P.K. (2004) ‘A key management scheme for wireless sensor networks using deployment knowledge’, Proceedings of IEEE INFOCOM 2004, Hong Kong, China.
-
(2004)
Proceedings of IEEE INFOCOM 2004
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
11
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington DC, USA
-
Du, W., Deng, J., Han, Y.S. and Varshney, P. (2003) ‘A pairwise key pre-distribution scheme for wireless sensor networks’, Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, USA, pp.42–51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
14
-
-
84990731886
-
How to prove yourself: practical solutions to identification and signature problems
-
Fiat, A. and Shamir, A. (1987) ‘How to prove yourself: practical solutions to identification and signature problems’, Advances in Cryptology – CRYPTO ’86, Vol. 263, Springer-Verlag, pp.186–196.
-
(1987)
Advances in Cryptology – CRYPTO ’86
, vol.263
, Issue.Springer-Verlag
, pp. 186-196
-
-
Fiat, A.1
Shamir, A.2
-
15
-
-
84937570422
-
Self-certified public keys
-
LNCS
-
Girault, M. (1991) ‘Self-certified public keys’, Advances in Cryptology-EUROCRYPT’91, LNCS, Springer-Verlag, pp.491–497.
-
(1991)
Advances in Cryptology-EUROCRYPT’91
, vol.Springer-Verlag
, pp. 491-497
-
-
Girault, M.1
-
16
-
-
3242657408
-
Group key agreement efficient in communication
-
Kim, Y., Perrig, A. and Tsudik, G. (2004) ‘Group key agreement efficient in communication’, Communications of the ACM, Vol. 53, No. 7, pp.905–921.
-
(2004)
Communications of the ACM
, vol.53
, Issue.7
, pp. 905-921
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
17
-
-
0348003132
-
The state of elliptic curve cryptography
-
Kobitz, N., Menezes, A. and Vanstone, S. (2000) ‘The state of elliptic curve cryptography’, Designs, Codes and Cryptography, Vol. 19, pp.173–193.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, pp. 173-193
-
-
Kobitz, N.1
Menezes, A.2
Vanstone, S.3
-
18
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, CA
-
Malan, D., Welsh, M. and Smith, M.D. (2004) ‘A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography’, Proceedings of first IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON), Santa Clara, CA.
-
(2004)
Proceedings of first IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON)
-
-
Malan, D.1
Welsh, M.2
Smith, M.D.3
-
20
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J. and Wagner, D. (2004) ‘Security in wireless sensor networks’, Communications of the ACM, Vol. 47, No. 6, pp.53–57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
21
-
-
4544301236
-
Decentralized reactive clustering for collaborative processing in sensor networks
-
Newport Beach, CA
-
Qi, H. and Xu, Y. (2004) ‘Decentralized reactive clustering for collaborative processing in sensor networks’, Proceedings of the IEEE 10th International Conference on Parallel and Distributed Systems (ICPADS), Vol. 91, Newport Beach, CA, pp.54–61.
-
(2004)
Proceedings of the IEEE 10th International Conference on Parallel and Distributed Systems (ICPADS)
, vol.91
, pp. 54-61
-
-
Qi, H.1
Xu, Y.2
-
22
-
-
3543055736
-
Mobile-agent-based collaborative signal and information processing in sensor networks
-
Qi, H., Xu, Y. and Wang, X. (2003) ‘Mobile-agent-based collaborative signal and information processing in sensor networks’, Proceedings of the IEEE, Vol. 91, pp.1172–1183.
-
(2003)
Proceedings of the IEEE
, vol.91
, pp. 1172-1183
-
-
Qi, H.1
Xu, Y.2
Wang, X.3
-
24
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A. and Adleman, L. (1983) ‘A method for obtaining digital signatures and public-key cryptosystems’, Communications of the ACM, Vol. 26, No. 1, pp.96–99.
-
(1983)
Communications of the ACM
, vol.26
, Issue.1
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
25
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Wander, A.S., Gura, N., Eberle, H., Gupta, V. and Shantz, S.C. (2005) ‘Energy analysis of public-key cryptography for wireless sensor networks’, Proceedings of the third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005), pp.324–328.
-
(2005)
Proceedings of the third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005)
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
26
-
-
14844304757
-
Tinypk: securing sensor networks with public key technology
-
Washington DC, USA
-
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C. and Kruus, P. (2004) ‘Tinypk: securing sensor networks with public key technology’, Proceedings of the Second ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, pp.59–64.
-
(2004)
Proceedings of the Second ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
27
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: a predistribtion and local collaboration-based approach
-
Miami, FL, USA
-
Zhang, W. and Cao, G. (2005) ‘Group rekeying for filtering false data in sensor networks: a predistribtion and local collaboration-based approach’, Proceedings of the 2005 IEEE INFOCOM, Miami, FL, USA.
-
(2005)
Proceedings of the 2005 IEEE INFOCOM
-
-
Zhang, W.1
Cao, G.2
|