-
1
-
-
33747142749
-
The capacity of wireless networks
-
IT
-
P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Transactions on Information Theory IT 2000, vol. IT-46(2), pp. 388-404, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.IT-46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.2
-
2
-
-
33750023217
-
An Effective Key Management Scheme for Heterogeneous Sensor Networks
-
Elsevier
-
X. Du, Y. Xiao, M. Guizani, H.H. Chen, "An Effective Key Management Scheme for Heterogeneous Sensor Networks", Ad Hoc Networks, Elsevier, vol. 5, issue 1, 2007, pp. 24-34.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.H.4
-
3
-
-
35348832710
-
Intel mote 2: An advanced platform for demanding sensor network applications
-
New York, NY, USA: ACM Press
-
R. Adler, M. Flanigan, J. Huang, R. Kling, N. Kushalnagar, L. Nachman, C.-Y. Wan, and M. Yarvis, "Intel mote 2: an advanced platform for demanding sensor network applications," in SenSys '05, New York, NY, USA: ACM Press, 2005, pp. 298-298.
-
(2005)
SenSys '05
, pp. 298-298
-
-
Adler, R.1
Flanigan, M.2
Huang, J.3
Kling, R.4
Kushalnagar, N.5
Nachman, L.6
Wan, C.-Y.7
Yarvis, M.8
-
4
-
-
70449491265
-
-
Crossbow Technology Inc
-
Crossbow Technology Inc., www.xbow.com
-
-
-
-
5
-
-
17744363146
-
Routing protocols for self-organizing hierarchical ad-hoc wireless networks
-
Symposium
-
S. Zhao, K. Tepe, I. Seskar, and D. Raychaudhuri, "Routing protocols for self-organizing hierarchical ad-hoc wireless networks," in IEEE Sarnoff 2003 Symposium.
-
(2003)
IEEE Sarnoff
-
-
Zhao, S.1
Tepe, K.2
Seskar, I.3
Raychaudhuri, D.4
-
7
-
-
33748959977
-
-
P. Traynor, H. Choi, G. Cao, S. Zhu, T. Porta, Establishing pair-wise keys in heterogeneous sensor networks, in: Proceedings of IEEE INFOCOM 06.
-
P. Traynor, H. Choi, G. Cao, S. Zhu, T. Porta, "Establishing pair-wise keys in heterogeneous sensor networks", in: Proceedings of IEEE INFOCOM 06.
-
-
-
-
8
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptology: Proceedings of EUROCRYPT, Springer-Verlag, 209
-
R. Blom, "An optimal class of symmetric key generation systems," Advances in Cryptology: Proceedings of EUROCRYPT 84, Lecture Notes in Computer Science, Springer-Verlag, 1985, 209:335-338.
-
(1985)
Lecture Notes in Computer Science
, vol.84
, pp. 335-338
-
-
Blom, R.1
-
9
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences,
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," Lecture Notes in Computer Science, 1993, 740:471-486.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
11
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
CCS, Washington DC, USA
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks", in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, USA, 2003, pp. 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
12
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
October
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks", In ACM CCS 2003, October 2003, pp. 62-72.
-
(2003)
In ACM CCS 2003
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
13
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Boston, Massachusetts, August
-
N. Gura, A. Patel, A. Wander, H. Eberle, S.C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs", in: Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, Boston, Massachusetts, August 2004.
-
(2004)
Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
15
-
-
84946840347
-
Short signatures from the weil pairing
-
Proc. Advances in Cryptology, Asiacrypt, Springer-Verlag
-
D. Bonech, B. Lynn, H. Shacham, "Short signatures from the weil pairing", in: Proc. Advances in Cryptology, Asiacrypt 2001, Springer-Verlag, LNCS 2248, 2001, pp. 514-532.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Bonech, D.1
Lynn, B.2
Shacham, H.3
-
16
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Proc. Advances in Cryptology, Crypto, Springer-Verlag
-
D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing", in: Proc. Advances in Cryptology, Crypto 2001, Springer-Verlag, LNCS 2139, 2001, pp. 213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
17
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties
-
P. Barreto, S. Galbraith, C. O'hEigeartaigh, M. Scott, "Efficient pairing computation on supersingular abelian varieties", Designs, Codes and Cryptography, 42(3)(2007) 239-271.
-
(2007)
Designs, Codes and Cryptography
, vol.42
, Issue.3
, pp. 239-271
-
-
Barreto, P.1
Galbraith, S.2
O'hEigeartaigh, C.3
Scott, M.4
-
18
-
-
46749097974
-
TinyTate: Computing the tate pairing in resource-constrained sensor nodes
-
L. B. Oliveira, D. F. Aranha, E. Morais, F. Daguano, "TinyTate: computing the tate pairing in resource-constrained sensor nodes", in: Proc. IEEE International Symposium on Network Computing and Applications NCA 2007, pp. 318-32.
-
Proc. IEEE International Symposium on Network Computing and Applications
, vol.NCA 2007
, pp. 318-332
-
-
Oliveira, L.B.1
Aranha, D.F.2
Morais, E.3
Daguano, F.4
|