-
1
-
-
33747142749
-
The Capacity of Wireless Networks
-
March
-
P. Gupta and P. R. Kumar, "The Capacity of Wireless Networks," IEEE Transactions on Information Theory, vol. IT-46, no. 2, March 2000, pp. 388-404.
-
(2000)
IEEE Transactions on Information Theory
, vol.IT-46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.R.2
-
2
-
-
0141509887
-
Data-gathering wireless sensor networks: Organization and capacity
-
Special Issue on Wireless Sensor Networks, November
-
E. J. Duarte-Melo and M. Liu, "Data-gathering wireless sensor networks: organization and capacity," Computer Networks (COMNET) Special Issue on Wireless Sensor Networks, Vol. 43, Issue 4, November 2003, pp. 519-537.
-
(2003)
Computer Networks (COMNET)
, vol.43
, Issue.4
, pp. 519-537
-
-
Duarte-Melo, E.J.1
Liu, M.2
-
3
-
-
0036286440
-
An Ad Hoc Network with Mobile Backbones
-
New York, NY, Apr
-
K. Xu, X. Hong, M. Gerla, "An Ad Hoc Network with Mobile Backbones," Proc. of IEEE ICC 2002, New York, NY, Apr. 2002.
-
(2002)
Proc. of IEEE ICC
-
-
Xu, K.1
Hong, X.2
Gerla, M.3
-
4
-
-
27644468340
-
A System for Simulation, Emulation, and Deployment of Heterogeneous Sensor Networks
-
L. Girod, T. Stathopoulos, N. Ramanathan, et al., "A System for Simulation, Emulation, and Deployment of Heterogeneous Sensor Networks," Proc. of ACM SenSys 2004.
-
(2004)
Proc. of ACM SenSys
-
-
Girod, L.1
Stathopoulos, T.2
Ramanathan, N.3
-
5
-
-
25844505160
-
Exploiting Heterogeneity in Sensor Networks
-
Miami, FL, March
-
M. Yarvis, N. Kushalnagar, H. Singh, et al., "Exploiting Heterogeneity in Sensor Networks," Proc. of the IEEE INFOCOM 2005, Miami, FL, March 2005.
-
(2005)
Proc. of the IEEE INFOCOM
-
-
Yarvis, M.1
Kushalnagar, N.2
Singh, H.3
-
7
-
-
28444433009
-
Random Key Predistribution Schemes for Sensor Networks
-
May 11-14, pp
-
H. Chan, A Perrig, D. Song, "Random Key Predistribution Schemes for Sensor Networks," Proc. of the 2003 IEEE Symposium on Security and Privacy, May 11-14, pp. 197 - 213.
-
Proc. of the 2003 IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
56749168247
-
-
X. Du, M. Guizani, Y. Xiao, S. Ci, H.H. Chen, A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, in: IEEE Transactions on Wireless Communications, accepted for publication (to appear).
-
X. Du, M. Guizani, Y. Xiao, S. Ci, H.H. Chen, A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, in: IEEE Transactions on Wireless Communications, accepted for publication (to appear).
-
-
-
-
9
-
-
85116610435
-
Mobile Networking for Smart Dust
-
MobiCom, Seattle, WA, August 17-19
-
J. M. Kahn, R. H. Katz and K. S. J. Pister, "Mobile Networking for Smart Dust," Proc. of ACM/IEEE Intl. Conf. on Mobile Computing and Networking (MobiCom), Seattle, WA, August 17-19, 1999, pp. 271 - 278.
-
(1999)
Proc. of ACM/IEEE Intl. Conf. on Mobile Computing and Networking
, pp. 271-278
-
-
Kahn, J.M.1
Katz, R.H.2
Pister, K.S.J.3
-
10
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation 48, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
11
-
-
27244436587
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Boston, Massachusetts, August
-
N. Gura, A. Patel, A Wander, H. Eberle, and S. C. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Proc. of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, Boston, Massachusetts, August 2004.
-
(2004)
Proc. of the 6th International Workshop on Cryptographic Hardware and Embedded Systems
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
12
-
-
0042981058
-
A Course in Number Theory and Cryptography
-
Second Edition, Springer
-
N. Koblitz, "A Course in Number Theory and Cryptography", Second Edition, Graduate Texts in Mathematics, Vol. 114, Springer, 1994.
-
(1994)
Graduate Texts in Mathematics
, vol.114
-
-
Koblitz, N.1
-
13
-
-
0003369154
-
Elliptic Curves in Cryptography
-
London Mathematical Society, Cambridge University Press
-
I. Blake, G. Seroussi, N. Smart, "Elliptic Curves in Cryptography," London Mathematical Society, Lecture Note Series 265, Cambridge University Press, 1999
-
(1999)
Lecture Note Series
, vol.265
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
-
14
-
-
46749097974
-
-
Leonardo B. Oliveira, Diego F. Aranha, Eduardo Morais, Felipe Daguano, Julio Lopez, and Dahab Ricardo, TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes, Sixth IEEE International Symposium on Network Computing and Applications, 2007, (NCA 2007). Issue, 12-14 July 2007, pp. 318 - 323.
-
Leonardo B. Oliveira, Diego F. Aranha, Eduardo Morais, Felipe Daguano, Julio Lopez, and Dahab Ricardo, "TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes", Sixth IEEE International Symposium on Network Computing and Applications, 2007, (NCA 2007). Volume, Issue, 12-14 July 2007, pp. 318 - 323.
-
-
-
-
15
-
-
34547668935
-
-
Leonardo B. Oliveira, Dahab Ricardo, Julio Lopez, Felipe Daguano, and Loureiro, Identity-Based Encryption for Sensor Networks, Fifth IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007, pp. 290-294.
-
Leonardo B. Oliveira, Dahab Ricardo, Julio Lopez, Felipe Daguano, and Loureiro, "Identity-Based Encryption for Sensor Networks", Fifth IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007, pp. 290-294.
-
-
-
-
16
-
-
56749118123
-
-
available at
-
Leonardo B. Oliveira, Diego Aranha, Eduardo Morais, Felipe Daguano, Julio L'opez, and Ricardo Dahab, "TinyTate: Identity-Based Encryption for Sensor Networks", available at http://eprint.iacr.org/2007/020.pdf
-
TinyTate: Identity-Based Encryption for Sensor Networks
-
-
Oliveira, L.B.1
Aranha, D.2
Morais, E.3
Daguano, F.4
L'opez, J.5
Dahab, R.6
-
17
-
-
0036870095
-
Mica: A wireless platform for deeply embedded networks
-
Jason L. Hill and David E. Culler. Mica: A wireless platform for deeply embedded networks. IEEE Micro, 22(6): 12-24, 2002.
-
(2002)
IEEE Micro
, vol.22
, Issue.6
, pp. 12-24
-
-
Hill, J.L.1
Culler, D.E.2
-
18
-
-
27544433726
-
TinyOS: An operating system for wireless sensor networks
-
W. Weber, J. Rabaey, and E. Aarts, editors, Springer-Verlag, New York, NY
-
Philip Levis, Sam Madden, Joseph Polastre, Robert Szewczyk, Kamin Whitehouse, Alec Woo, David Gay, Jason Hill, Matt Welsh, Eric Brewer, and David Culler. TinyOS: An operating system for wireless sensor networks. In W. Weber, J. Rabaey, and E. Aarts, editors, Ambient Intelligence. Springer-Verlag, New York, NY, 2004.
-
(2004)
Ambient Intelligence
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Whitehouse, K.5
Woo, A.6
Gay, D.7
Hill, J.8
Welsh, M.9
Brewer, E.10
Culler, D.11
-
19
-
-
0037623983
-
Identity Based Encryption from the Weil Pairing
-
D. Boneh, M. Franklin, "Identity Based Encryption from the Weil Pairing", SIAM Computing, Vol. 32, No. 3, 2003, pp. 586-615.
-
(2003)
SIAM Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
20
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Advances in Cryptology, Crypto, Springer-Verlag
-
P. S. L. M. Berreto, H. Y. Kim and M. Scott, "Efficient algorithms for pairing-based cryptosystems", Advances in Cryptology - Crypto '2002, LNCS 2442, Springer-Verlag (2002), pp.354-368.
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Berreto, P.S.L.M.1
Kim, H.Y.2
Scott, M.3
-
21
-
-
82955246861
-
Implementing the Tate Pairing
-
Algorithm Number Theory Symposium, ANTS, 2369, Springer- Verlag
-
S. Galbraith, K. Harrison and D. Soldera, "Implementing the Tate Pairing", Algorithm Number Theory Symposium - ANTS V, LNCS 2369, Springer- Verlag (2002), pp. 324-337.
-
(2002)
LNCS
, vol.5
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
22
-
-
84874324906
-
Identity-based encryption from the Weil pairing, Advances in Cryptology - CRYPTO
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing", Advances in Cryptology - CRYPTO, Lecture Notes in Comput Sci. 2139 (2001), pp.213-229.
-
(2001)
Lecture Notes in Comput Sci
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
23
-
-
84946840347
-
Short signatures from the Weil pairing, Advances in cryptology -ASIACRYPT
-
D. Boneh, B. Lynn and H. Shachum, "Short signatures from the Weil pairing", Advances in cryptology -ASIACRYPT, Lecture Notes in Comput Sci. 2248 (2001), pp.514-532.
-
(2001)
Lecture Notes in Comput Sci
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shachum, H.3
-
26
-
-
28444481397
-
Maintaining Differentiated Coverage in Heterogeneous Sensor Networks
-
X. Du and F. Lin, "Maintaining Differentiated Coverage in Heterogeneous Sensor Networks," EURASIP Journal on Wireless Communications and Networking, Issue 4, 2005, pp 565-572.
-
(2005)
EURASIP Journal on Wireless Communications and Networking
, Issue.4
, pp. 565-572
-
-
Du, X.1
Lin, F.2
-
27
-
-
35448987469
-
Energy Efficient Chessboard Clustering and Routing in Heterogeneous Sensor Network
-
Jan
-
X. Du and Y. Xiao, "Energy Efficient Chessboard Clustering and Routing in Heterogeneous Sensor Network," International Journal of Wireless and Mobile Computing (IJWMC), Vol. 1, No. 2, Jan. 2006, pp. 121 -130.
-
(2006)
International Journal of Wireless and Mobile Computing (IJWMC)
, vol.1
, Issue.2
, pp. 121-130
-
-
Du, X.1
Xiao, Y.2
-
28
-
-
33744930111
-
Lossy Network Correlated Data Gathering with High-Resolution Coding
-
R. Cristescu, and B. Beferull-Lozano, "Lossy Network Correlated Data Gathering with High-Resolution Coding," Proc. of IEEE IPSN 2005.
-
(2005)
Proc. of IEEE IPSN
-
-
Cristescu, R.1
Beferull-Lozano, B.2
|