-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
February
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, February 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
3
-
-
58049102892
-
-
Geng Yang, Chunming Rong and Christian Veigner etc, al. Identity-Based Key Agreement and Encryption For Wireless Sensor Networks, International Journal of Computer Science and Network Security, 6, no.5B, pp. 182-189, May 2006.
-
Geng Yang, Chunming Rong and Christian Veigner etc, al. "Identity-Based Key Agreement and Encryption For Wireless Sensor Networks," International Journal of Computer Science and Network Security, vol.6, no.5B, pp. 182-189, May 2006.
-
-
-
-
4
-
-
63449122349
-
Digital Signcryption or how to achieve cost (signature & encryption)cost(signature)+cost(encryption)
-
Advances in Crypto-logy-CRYPTO'97, Berlin: Springer- Verlag, pp
-
Y. Zheng, "Digital Signcryption or how to achieve cost (signature & encryption)«cost(signature)+cost(encryption)," Advances in Crypto-logy-CRYPTO'97, LNCS 1294, Berlin: Springer- Verlag, pp. 165-179, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
5
-
-
58049097872
-
-
J. Malone-Lee, Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. Available from: http://eprint.iacr.org/ 2002/098.
-
J. Malone-Lee, "Identity based signcryption. Cryptology ePrint Archive," Report 2002/098, 2002. Available from: http://eprint.iacr.org/ 2002/098.
-
-
-
-
6
-
-
33646828571
-
Robust ID-based threshold signcryption scheme from pairings
-
Shanghai, China, pp
-
S. Duan, Z. Cao, and R. Lu, "Robust ID-based threshold signcryption scheme from pairings," 2004 International Conference on Information Security, Shanghai, China, pp: 33-37, 2004.
-
(2004)
2004 International Conference on Information Security
, pp. 33-37
-
-
Duan, S.1
Cao, Z.2
Lu, R.3
-
8
-
-
3042597451
-
Identity-based threshold signature scheme from the bilinear pairings
-
Las Vegas, Nevada, USA, pp
-
J. Baek and Y. Zheng, "Identity-based threshold signature scheme from the bilinear pairings," International Conference on Information Technology: Coding and Computing-ITCC'04, Las Vegas, Nevada, USA, pp: 124-128, 2004.
-
(2004)
International Conference on Information Technology: Coding and Computing-ITCC'04
, pp. 124-128
-
-
Baek, J.1
Zheng, Y.2
-
9
-
-
58049117824
-
Study on Signcryption Schemes from Bilinear Pairings,
-
PhD thesis, Xidian Unviersity, Jan
-
F. Li., "Study on Signcryption Schemes from Bilinear Pairings," PhD thesis, Xidian Unviersity, Jan 2007.
-
(2007)
-
-
Li, F.1
-
10
-
-
33646827174
-
An identity-based threshold signcryption scheme with semantic security
-
Computational Intelligence and Security-CIS, Berlin: Springer-Verlag, pp
-
C. Peng and X. Li., "An identity-based threshold signcryption scheme with semantic security," Computational Intelligence and Security-CIS 2005, LNAI 3802, Berlin: Springer-Verlag, pp: 173-179, 2005.
-
(2005)
LNAI
, vol.3802
, pp. 173-179
-
-
Peng, C.1
Li, X.2
|