-
1
-
-
35448931599
-
Applicability of identity-based cryptography for disruption-tolerant networking
-
N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott. and C. Luo. Applicability of identity-based cryptography for disruption-tolerant networking. In MobiOpp 2007.
-
(2007)
MobiOpp
-
-
Asokan, N.1
Kostiainen, K.2
Ginzboorg, P.3
Ott, J.4
Luo, C.5
-
2
-
-
0012970453
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO 2001.
-
(2001)
CRYPTO
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
77950169459
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE SP 2003.
-
IEEE SP 2003
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
77950151506
-
An identity based encryption scheme based on. quadratic residues
-
C. Cocks. An identity based encryption scheme based on. quadratic residues. In LNCS 2260 (2001).
-
(2001)
LNCS
, vol.2260
-
-
Cocks, C.1
-
6
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
W. Du, R. Wang, and P. Ning. An efficient scheme for authenticating public keys in sensor networks. In MobiHoc 2005.
-
MobiHoc 2005
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
7
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS 2002.
-
CCS 2002
-
-
Eschenauer, L.1
Gligor, V.D.2
-
9
-
-
34249316910
-
Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
-
J. Girao, D. Westhoff, E. Mykletun, and T. Araki. Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Networks 2007.
-
Ad Hoc Networks 2007
-
-
Girao, J.1
Westhoff, D.2
Mykletun, E.3
Araki, T.4
-
10
-
-
72749121963
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. C. Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In PerCom 2005.
-
PerCom 2005
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Shantz, S.C.8
-
11
-
-
56749165935
-
Exploiting hierarchical identity-based encryption for access control to pervasive computing information
-
U. Hengartner and P. Steenkiste. Exploiting hierarchical identity-based encryption for access control to pervasive computing information. In SecureComm 2005.
-
SecureComm 2005
-
-
Hengartner, U.1
Steenkiste, P.2
-
12
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys 2004.
-
SenSys 2004
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
14
-
-
56749132791
-
Serloc: Secure range-independent localization for wireless sensor networks
-
L. Lazos and R. Poovendran. Serloc: Secure range-independent localization for wireless sensor networks. ACM TOSN 2005.
-
ACM TOSN 2005
-
-
Lazos, L.1
Poovendran, R.2
-
15
-
-
56749176053
-
-
A. Liu, P. Kampanakis, and P. Ning. Tinyecc: Elliptic curve cryptography for sensor networks version 0.3, 2007
-
A. Liu, P. Kampanakis, and P. Ning. Tinyecc: Elliptic curve cryptography for sensor networks (version 0.3). 2007.
-
-
-
-
16
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In CCS 2003.
-
CCS 2003
-
-
Liu, D.1
Ning, P.2
-
17
-
-
33750836005
-
Key technical challenges and current implementations of body sensor networks
-
B. Lo and G. Z, Yang. Key technical challenges and current implementations of body sensor networks. In BSN 2005.
-
BSN 2005
-
-
Lo, B.1
Yang, G.Z.2
-
18
-
-
56749176558
-
Codeblue: An ad hoc sensor network infrastructure for emergency medical care
-
D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In BSN 2004.
-
BSN 2004
-
-
Malan, D.1
Fulford-Jones, T.2
Welsh, M.3
Moulton, S.4
-
19
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
D. J. Malan, M. Welsh, and M. D. Smith. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In SECON 2004.
-
SECON 2004
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
20
-
-
35549002780
-
Addressing security in medical sensor networks
-
K. Malasri and L. Wang. Addressing security in medical sensor networks. In HealthNet 2007.
-
HealthNet 2007
-
-
Malasri, K.1
Wang, L.2
-
22
-
-
85141900633
-
Public key based cryptoschemes for data concealment in wireless sensor networks
-
E. Mykletun, J. Girao, and D. Westhoff. Public key based cryptoschemes for data concealment in wireless sensor networks. In ICC2006.
-
ICC2006
-
-
Mykletun, E.1
Girao, J.2
Westhoff, D.3
-
24
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 1984.
-
CRYPTO 1984
-
-
Shamir, A.1
-
25
-
-
85008955601
-
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)
-
International Conference on Information and Communication Security ICICS 2006
-
H. Wang and Q. Li. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). In International Conference on Information and Communication Security (ICICS 2006), LNCS 4307.
-
LNCS
, vol.4307
-
-
Wang, H.1
Li, Q.2
-
26
-
-
51349093348
-
ECC: An Elliptic Curve Cryptography Suite on Sensor Motes
-
Technical Report WM-CS-2007-11
-
H. Wang, B. Sheng, C. C. Tan, and Q. Li. WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes. In Technical Report WM-CS-2007-11, 2007.
-
(2007)
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
WM, Q.L.4
-
27
-
-
33750795341
-
A phone-centered body sensor network platform: Cost, energy efficiency and user interface
-
L. Zhong, M. Sinclair, and R. Bittner. A phone-centered body sensor network platform: cost, energy efficiency and user interface. In BSN 2006.
-
BSN 2006
-
-
Zhong, L.1
Sinclair, M.2
Bittner, R.3
|