-
1
-
-
70349565196
-
Elliptic curve key agreement and key transport protocols
-
American Bankers Association
-
ANSI X9.63. (1999). Elliptic curve key agreement and key transport protocols. American Bankers Association.
-
(1999)
ANSI X9.63.
-
-
-
2
-
-
15844425036
-
Aggregation in sensor networks: An energy-accuracy trade-off
-
DOI 10.1016/S1570-8705(03)00009-X
-
A. Boulis S. Ganeriwal M.B. Srivastava 2003 Aggregation in sensor networks: An energy-accuracy trade-off ElseVier J. Ad Hoc Netw 1 2-3 317 331 10.1016/S1570-8705(03)00009-X (Pubitemid 40421416)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 317-331
-
-
Boulis, A.1
Ganeriwal, S.2
Srivastava, M.B.3
-
3
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pp. 109-117.
-
(2005)
Proceedings of Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005)
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
5
-
-
70349567202
-
Elliptic curve cryptography-How it Works
-
Chang, S., Eberle, H., Gupta, V., & Gura, N. Elliptic curve cryptography-How it Works. Sun Microsystems Laboratories Next Generation Crypto. http://research.sun.com/projects/crypto.
-
Sun Microsystems Laboratories Next Generation Crypto.
-
-
Chang, S.1
Eberle, H.2
Gupta, V.3
Gura, N.4
-
6
-
-
3042808479
-
Strong minimum energy topology in wireless sensor networks: NP completeness and heuristics
-
10.1109/TMC.2003.1233530
-
X. Cheng B. Narahari R. Simha M.X. Cheng D. Liu 2002 Strong minimum energy topology in wireless sensor networks: NP completeness and heuristics IEEE Trans Mob Comput, 2 3 248 256 10.1109/TMC.2003.1233530
-
(2002)
IEEE Trans Mob Comput
, vol.2
, Issue.3
, pp. 248-256
-
-
Cheng, X.1
Narahari, B.2
Simha, R.3
Cheng, M.X.4
Liu, D.5
-
8
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., & Shantz, S. C. (2005). Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Proceedings of IEEE International Conference on Pervasive Computing and Communications 2005 (pp. 247-246).
-
(2005)
Proceedings of IEEE International Conference on Pervasive Computing and Communications 2005
, pp. 247-246
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
13
-
-
0030577321
-
A new privacy homomorphism and applications
-
DOI 10.1016/S0020-0190(96)00170-6, PII S0020019096001706
-
D.-F. Josep 1996 A new privacy homomorphism and applications Information Process Lett. 60 5 277 282 10.1016/S0020-0190(96)00170-6 (Pubitemid 126393007)
-
(1996)
Information Processing Letters
, vol.60
, Issue.5
, pp. 277-282
-
-
Domingo, I.1
Ferrer, J.2
-
14
-
-
70349581451
-
Quantifying eavesdropping vulnerability in sensor networks
-
Proceedings of the 2nd International Workshop on Data Management for Sensor Networks
-
Madhukar, A., Zachary, I., & Insup, L. (2005). Quantifying eavesdropping vulnerability in sensor networks. ACM International Conference Proceeding Series 2005, Vol. 96: Proceedings of the 2nd International Workshop on Data Management for Sensor Networks (pp. 3-9).
-
(2005)
ACM International Conference Proceeding Series 2005
, vol.96
, pp. 3-9
-
-
Madhukar, A.1
Zachary, I.2
Insup, L.3
-
17
-
-
0036738266
-
SPINS: Security protocols for sensor
-
1030.68814 10.1023/A:1016598314198
-
A. Perrig R. Szewczyk 2002 SPINS: Security protocols for sensor J. Wireless Netw. 8 521 534 1030.68814 10.1023/A:1016598314198
-
(2002)
J. Wireless Netw.
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
-
19
-
-
38149043296
-
A secure data aggregation scheme for wireless sensor networks
-
Ren, S. Q., Kim, D. S., & Park, J. S. (2007) A secure data aggregation scheme for wireless sensor networks. In Proceedings of Frontiers of High Performance Computing and Networking-ISPA 2007 Workshops, (pp. 32-40).
-
(2007)
Proceedings of Frontiers of High Performance Computing and Networking-ISPA 2007 Workshops
, pp. 32-40
-
-
Ren, S.Q.1
Kim, D.S.2
Park, J.S.3
-
23
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
DOI 10.1109/TMC.2006.144, 1683790
-
D. Westhoff J. Girao M. Schneider 2006 Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation IEEE Trans. Mob. Comput. 5 10 1417 1431 10.1109/TMC.2006.144 (Pubitemid 44335247)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
|