-
1
-
-
70350600372
-
8-bit ARVR® Instruction Set
-
Atmel Corporation, July 2008
-
Atmel Corporation. 8-bit ARVR® Instruction Set. User Guide (July 2008), http://www.atmel.com/dyn/resources/prod-documents/doc0856.pdf
-
User Guide
-
-
-
2
-
-
70350603296
-
8-bit ARVR® Microcontroller with 128K Bytes In-System Programmable Flash: ATmega128, ATmega128L
-
Atmel Corporation, June 2008
-
Atmel Corporation. 8-bit ARVR® Microcontroller with 128K Bytes In-System Programmable Flash: ATmega128, ATmega128L. Datasheet (June 2008), http://www.atmel.com/dyn/resources/prod-documents/doc2467.pdf
-
Datasheet
-
-
-
3
-
-
33745855808
-
-
Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, 3934, pp. 104-118. Springer, Heidelberg (2006)
-
Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104-118. Springer, Heidelberg (2006)
-
-
-
-
4
-
-
33749408128
-
Efficient implementation of elliptic curve cryptography for wireless sensor networks
-
Technical Report TM-2005-1, Institute of Telematics, University of Karlsruhe, Karlsruhe, Germany March
-
Blaß, E.-O., Zitterbart, M.: Efficient implementation of elliptic curve cryptography for wireless sensor networks. Technical Report TM-2005-1, Institute of Telematics, University of Karlsruhe, Karlsruhe, Germany (March 2005), http://doc.tm.uka.de/2005/tm-2005-1.pdf
-
(2005)
-
-
Blaß, E.-O.1
Zitterbart, M.2
-
5
-
-
85028765277
-
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, 740, pp. 471-486. Springer, Heidelberg (1993)
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471-486. Springer, Heidelberg (1993)
-
-
-
-
6
-
-
18144374315
-
10 emerging technologies that will change the world
-
Brody, H.: 10 emerging technologies that will change the world. Technology Review 106(1), 33-49 (2003)
-
(2003)
Technology Review
, vol.106
, Issue.1
, pp. 33-49
-
-
Brody, H.1
-
7
-
-
0142103313
-
Security and privacy in sensor networks
-
Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103-105 (2003)
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
8
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
IEEE, Los Alamitos
-
Chan, H., Perrig, A.: PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM2005), vol. 1, pp. 524-535. IEEE, Los Alamitos (2005)
-
(2005)
Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM2005)
, vol.1
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
9
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
IEEE Computer Society Press, Los Alamitos
-
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 24th IEEE Symposium on Security and Privacy (S&P 2003), pp. 197-213. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proceedings of the 24th IEEE Symposium on Security and Privacy (S&P
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
33846999288
-
The Internet of things
-
Conti, J.P.: The Internet of things. IET Communications Engineer 4(6), 20-25 (2007)
-
(2007)
IET Communications Engineer
, vol.4
, Issue.6
, pp. 20-25
-
-
Conti, J.P.1
-
11
-
-
70350608993
-
-
Crossbow Technology, Inc.MICAzWireless Measurement System. Data sheet (January 2006), http://www.xbow.com/Products/Product-pdf-files/Wireless-pdf/ MICAz-Datasheet.pdf
-
Crossbow Technology, Inc.MICAzWireless Measurement System. Data sheet (January 2006), http://www.xbow.com/Products/Product-pdf-files/Wireless-pdf/ MICAz-Datasheet.pdf
-
-
-
-
12
-
-
70350585617
-
Security in wireless mobile and sensor networks
-
Guizani, M, ed, ch. 18, pp, Springer, Heidelberg
-
Das, S.K., Agah, A., Basu, K.: Security in wireless mobile and sensor networks. In: Guizani, M. (ed.) Wireless Communications Systems and Networks, ch. 18, pp. 531-557. Springer, Heidelberg (2004)
-
(2004)
Wireless Communications Systems and Networks
, pp. 531-557
-
-
Das, S.K.1
Agah, A.2
Basu, K.3
-
13
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
IEEE Computer Society Press, Los Alamitos
-
de Meulenaer, G., Gosset, F., Standaert, F.-X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008), pp. 580-585. IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB
, pp. 580-585
-
-
de Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
15
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Jajodia, S, Atluri, V, Jaeger, T, eds, ACM Press, New York
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 62-72. ACM Press, New York (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS
, pp. 62-72
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
18
-
-
27344450097
-
-
Großschädl, J., Avanzi, R.M., Savaş, E., Tillich, S.: Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 75-90. Springer, Heidelberg (2005)
-
Großschädl, J., Avanzi, R.M., Savaş, E., Tillich, S.: Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 75-90. Springer, Heidelberg (2005)
-
-
-
-
19
-
-
33750709739
-
-
m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 133-147. Springer, Heidelberg (2004)
-
m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 133-147. Springer, Heidelberg (2004)
-
-
-
-
20
-
-
34748898963
-
The energy cost of cryptographic key establishment in wireless sensor networks
-
Deng, R.H, Samarati, P, eds, ACM Press, New York
-
Großschädl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: Deng, R.H., Samarati, P. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 380-382. ACM Press, New York (2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS
, pp. 380-382
-
-
Großschädl, J.1
Szekely, A.2
Tillich, S.3
-
21
-
-
35048818581
-
-
Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 119-132. Springer, Heidelberg (2004)
-
Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
-
-
-
22
-
-
11244267013
-
-
Springer, Heidelberg
-
Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.R.1
Menezes, A.J.2
Vanstone, S.A.3
-
23
-
-
70350579484
-
Fast arithmetic on ATmega128 for elliptic curve cryptography. Cryptology ePrint Archive
-
Report 2008/442
-
Kargl, A., Pyka, S., Seuschek, H.: Fast arithmetic on ATmega128 for elliptic curve cryptography. Cryptology ePrint Archive, Report 2008/442 (2008), http://eprint.iacr.org
-
(2008)
-
-
Kargl, A.1
Pyka, S.2
Seuschek, H.3
-
24
-
-
0003899818
-
-
Version 5, Internet Engineering Task Force, Network Working Group, RFC 1510 September
-
Kohl, J.T., Neuman, B.C.: The Kerberos Network Authentication Service (Version 5). Internet Engineering Task Force, Network Working Group, RFC 1510 (September 1993)
-
(1993)
The Kerberos Network Authentication Service
-
-
Kohl, J.T.1
Neuman, B.C.2
-
26
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Jajodia, S, Atluri, V, Jaeger, T, eds, ACM Press, New York
-
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52-61. ACM Press, New York (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
27
-
-
58649109885
-
Security for Wireless Sensor Networks
-
Springer, Heidelberg
-
Liu, D., Ning, P.: Security for Wireless Sensor Networks. Advances in Information Security, vol. 28. Springer, Heidelberg (2006)
-
(2006)
Advances in Information Security
, vol.28
-
-
Liu, D.1
Ning, P.2
-
29
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
IEEE, Los Alamitos
-
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 71-80. IEEE, Los Alamitos (2004)
-
(2004)
Proceedings of the 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
31
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993-999 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
32
-
-
70350615129
-
-
ON World, Inc. WSN for smart homes, February
-
ON World, Inc. WSN for smart homes. Market Dynamics Report (February 2008)
-
(2008)
Market Dynamics Report
-
-
-
33
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
ACM Press, New York
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM 2001), pp. 189-199. ACM Press, New York (2001)
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
34
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
Zhu, S, Liu, D, eds, ACM Press, New York
-
Piotrowski, K., Langendörfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Zhu, S., Liu, D. (eds.) Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), pp. 169-176. ACM Press, New York (2006)
-
(2006)
Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN
, pp. 169-176
-
-
Piotrowski, K.1
Langendörfer, P.2
Peter, S.3
-
35
-
-
70350611497
-
-
Scott, M., Szczechowiak, P.: Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007/299 (2007), http://eprint.iacr.org
-
Scott, M., Szczechowiak, P.: Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007/299 (2007), http://eprint.iacr.org
-
-
-
-
36
-
-
68149165367
-
-
m) on 8-bit Micaz mote. IEICE Transactions on Information and Systems E91-D(5), 1338-1347 (2008)
-
m) on 8-bit Micaz mote. IEICE Transactions on Information and Systems E91-D(5), 1338-1347 (2008)
-
-
-
-
37
-
-
84889404551
-
-
John Wiley and Sons Ltd, Chichester
-
Swami, A., Zhao, Q., Hong, Y.-W., Tong, L.: Wireless Sensor Networks: Signal Processing and Communications Perspectives. John Wiley and Sons Ltd., Chichester (2007)
-
(2007)
Wireless Sensor Networks: Signal Processing and Communications Perspectives
-
-
Swami, A.1
Zhao, Q.2
Hong, Y.-W.3
Tong, L.4
-
38
-
-
49949100301
-
-
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, 4913, pp. 305-320. Springer, Heidelberg (2008)
-
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
-
-
-
-
39
-
-
70350617038
-
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
-
Wolf, T, Parameswaran, S, eds
-
Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11-16 (2007), http://arxiv.org/abs/0903.3900
-
(2007)
Proceedings of the 2nd Workshop on Embedded Systems Security (WESS
, pp. 11-16
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.A.5
-
40
-
-
37149040069
-
-
Uhsadel, L., Poschmann, A., Paar, C.: Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, 4572, pp. 73-86. Springer, Heidelberg (2007)
-
Uhsadel, L., Poschmann, A., Paar, C.: Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 73-86. Springer, Heidelberg (2007)
-
-
-
-
41
-
-
85008955601
-
Efficient Implementation of Public Key Cryptosystems on Mote Sensors
-
Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
-
Wang, H., Li, Q.: Efficient Implementation of Public Key Cryptosystems on Mote Sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519-528. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
-
42
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications 30(11/12), 2314-2341 (2007)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
44
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
-
IEEE Computer Society Press, Los Alamitos
-
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), pp. 326-335. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|