-
3
-
-
61649097725
-
-
Bernstein, B.: Circuits for integer factorization: A proposal (manuscript, 2001), http://cr.yp.to/papers.html
-
Bernstein, B.: Circuits for integer factorization: A proposal (manuscript, 2001), http://cr.yp.to/papers.html
-
-
-
-
4
-
-
61649113741
-
-
Corke, P., Sikka, P.: Demo abstract: FOS -a new operating system for sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, 4913. Springer, Heidelberg (2008)
-
Corke, P., Sikka, P.: Demo abstract: FOS -a new operating system for sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913. Springer, Heidelberg (2008)
-
-
-
-
5
-
-
34247397108
-
Secure code distribution in dynamically programmable wireless sensor networks
-
ACM Press, New York
-
Deng, J., Han, R., Mishra, S.: Secure code distribution in dynamically programmable wireless sensor networks. In: IPSN 2006: Proceedings of the fifth international conference on Information processing in sensor networks, pp. 292-300. ACM Press, New York (2006)
-
(2006)
IPSN 2006: Proceedings of the fifth international conference on Information processing in sensor networks
, pp. 292-300
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
6
-
-
77954812422
-
Design and deployment of a remote robust sensor network: Experiences from an outdoor water quality monitoring network
-
Dublin, Ireland October
-
Dinh, T.L., Hu, W., Sikka, P., Corke, P., Overs, L., Brosnan, S.: Design and deployment of a remote robust sensor network: Experiences from an outdoor water quality monitoring network. In: Second IEEE Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2007), Dublin, Ireland (October 2007)
-
(2007)
Second IEEE Workshop on Practical Issues in Building Sensor Network Applications (SenseApp
-
-
Dinh, T.L.1
Hu, W.2
Sikka, P.3
Corke, P.4
Overs, L.5
Brosnan, S.6
-
7
-
-
34247376029
-
Securing the deluge network programming system
-
ACM Press, New York
-
Dutta, P.K., Hui, J.W., Chu, D.C., Culler, D.E.: Securing the deluge network programming system. In: IPSN 2006: Proceedings of the fifth international conference on Information processing in sensor networks, pp. 326-333. ACM Press, New York (2006)
-
(2006)
IPSN 2006: Proceedings of the fifth international conference on Information processing in sensor networks
, pp. 326-333
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
8
-
-
0031351746
-
New directions in cryptography: Twenty some years later (or cryptograpy and complexity theory: a match made in heaven)
-
Washington, DC, USA, p, IEEE Computer Society Press, Los Alamitos
-
Goldwasser, S.: New directions in cryptography: twenty some years later (or cryptograpy and complexity theory: a match made in heaven). In: FOCS 1997: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS 1997), Washington, DC, USA, p. 314. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
FOCS 1997: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS
, pp. 314
-
-
Goldwasser, S.1
-
9
-
-
35048818581
-
-
Gurn, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 119-132. Springer, Heidelberg (2004)
-
Gurn, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
-
-
-
10
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
Technical report, University of Colorado at Boulder January
-
Härtung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: The need for secure systems. Technical report, University of Colorado at Boulder (January 2005)
-
(2005)
-
-
Härtung, C.1
Balasalle, J.2
Han, R.3
-
11
-
-
0036870095
-
Mica: A wireless platform for deeply embedded networks
-
Hill, J., Culler, D.: Mica: a wireless platform for deeply embedded networks. IEEE Micro 22(6), 12-24 (2002)
-
(2002)
IEEE Micro
, vol.22
, Issue.6
, pp. 12-24
-
-
Hill, J.1
Culler, D.2
-
12
-
-
33744924460
-
The design and evaluation of a hybrid sensor network for cane-toad monitoring
-
Piscataway, NJ, USA. IEEE Press, Los Alamitos
-
Hu, W., Tran, V.N., Bulusu, N., Chou, C.T., Jha, S., Taylor, A.: The design and evaluation of a hybrid sensor network for cane-toad monitoring. In: IPSN 2005: Proceedings of the 4th international symposium on Information processing in sensor networks, Piscataway, NJ, USA. IEEE Press, Los Alamitos (2005)
-
(2005)
IPSN 2005: Proceedings of the 4th international symposium on Information processing in sensor networks
-
-
Hu, W.1
Tran, V.N.2
Bulusu, N.3
Chou, C.T.4
Jha, S.5
Taylor, A.6
-
14
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
ACM Press, New York
-
Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: SenSys 2004: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162-175. ACM Press, New York (2004)
-
(2004)
SenSys 2004: Proceedings of the 2nd international conference on Embedded networked sensor systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
15
-
-
51249087814
-
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
-
Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Liu, A., Ning, P.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN 2008: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), Washington, DC, USA, pp. 245-256. IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
IPSN 2008: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks (ipsn
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
16
-
-
15744395962
-
Tea extensions
-
Technical report, University of Cambridge October
-
Needham, R., Wheeler, D.: Tea extensions. Technical report, University of Cambridge (October 1997)
-
(1997)
-
-
Needham, R.1
Wheeler, D.2
-
17
-
-
56749175324
-
Key management and secure software updates in wireless process control environments
-
ACM Press, New York
-
Nilsson, D.K., Roosta, T., Lindqvist, U., Valdes, A.: Key management and secure software updates in wireless process control environments. In: WiSec 2008: Proceedings of the first ACM conference on Wireless network security, pp. 100-108. ACM Press, New York (2008)
-
(2008)
WiSec 2008: Proceedings of the first ACM conference on Wireless network security
, pp. 100-108
-
-
Nilsson, D.K.1
Roosta, T.2
Lindqvist, U.3
Valdes, A.4
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978)
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
19
-
-
20844460401
-
On the cost of factoring rsa-1024
-
Shamir, A., Tromer, E.: On the cost of factoring rsa-1024. RSA CrytoBytes 6(2) (2003)
-
(2003)
RSA CrytoBytes
, vol.6
, Issue.2
-
-
Shamir, A.1
Tromer, E.2
-
20
-
-
56749158656
-
Secure multi-hop network programming with multiple one-way key chains
-
ACM Press, New York
-
Tan, H., Jha, S., Ostry, D., Zic, J., Sivaraman, V.: Secure multi-hop network programming with multiple one-way key chains. In: WiSec 2008: Proceedings of the first ACM conference on Wireless network security, pp. 183-193. ACM Press, New York (2008)
-
(2008)
WiSec 2008: Proceedings of the first ACM conference on Wireless network security
, pp. 183-193
-
-
Tan, H.1
Jha, S.2
Ostry, D.3
Zic, J.4
Sivaraman, V.5
-
21
-
-
35348818677
-
The design and evaluation of a mobile sensor/actuator network for autonomous animal control
-
ACM Press, New York
-
Wark, T., Crossman, C., Hu, W., Guo, Y., Valencia, P., Sikka, P., Corke, P., Lee, C., Henshall, J., Prayaga, K., O'Grady, J., Reed, M., Fisher, A.: The design and evaluation of a mobile sensor/actuator network for autonomous animal control. In: IPSN 2007: Proceedings of the 6th international conference on Information processing in sensor networks, pp. 206-215. ACM Press, New York (2007)
-
(2007)
IPSN 2007: Proceedings of the 6th international conference on Information processing in sensor networks
, pp. 206-215
-
-
Wark, T.1
Crossman, C.2
Hu, W.3
Guo, Y.4
Valencia, P.5
Sikka, P.6
Corke, P.7
Lee, C.8
Henshall, J.9
Prayaga, K.10
O'Grady, J.11
Reed, M.12
Fisher, A.13
-
22
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
ACM Press, New York
-
Watro, R., Kong, D., Cuti, S.-f., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: SASN 2004: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59-64. ACM Press, New York (2004)
-
(2004)
SASN 2004: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.-F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
|