-
1
-
-
35048867517
-
-
Camtepe, Yener, Combinational Design of Key Distribution Mechanisms for Wireless Sensor Networks, LNCS 3193 ESORICS'04 2004.
-
Camtepe, Yener, Combinational Design of Key Distribution Mechanisms for Wireless Sensor Networks, LNCS 3193 ESORICS'04 2004.
-
-
-
-
2
-
-
63749114135
-
A Survey of Identity-Based Cryptography
-
Baek, Newmarch, Safavi-Naini Susilo, A Survey of Identity-Based Cryptography, In Proc. of the 10th AUUG 2004, pp. 95-102.
-
Proc. of the 10th
, vol.AUUG 2004
, pp. 95-102
-
-
Baek, N.1
Susilo, S.-N.2
-
3
-
-
77950169459
-
Random Key Predistribution Schemes for Sensor Networks
-
Chan, Perring, Song, Random Key Predistribution Schemes for Sensor Networks, IEEE S&P'03 2003
-
(2003)
IEEE S&P'03
-
-
Chan1
Perring2
Song3
-
4
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Boneh, Franklin: Identity-Based Encryption from the Weil Pairing, In Proceedings of CRYPTO 2001, pp 213-229.
-
(2001)
Proceedings of CRYPTO
, pp. 213-229
-
-
Boneh, F.1
-
5
-
-
11144302585
-
Wireless Sensor Networks
-
Culler, Hong, Wireless Sensor Networks, Communications of ACM, Vol. 47 No. 6, 2004
-
(2004)
Communications of ACM
, vol.47
, Issue.6
-
-
Hong, C.1
-
6
-
-
77950112592
-
-
Di Pietro, Mancini, Mei, Random Key-Assignment for Secure Wireless Sensor Networks, ACM SANS'03 2003
-
Di Pietro, Mancini, Mei, Random Key-Assignment for Secure Wireless Sensor Networks, ACM SANS'03 2003
-
-
-
-
7
-
-
23244467182
-
A Pair Wise Key Pre-Distribution Scheme for Wireless Sensor Networks
-
Du, Dend, Han, Varshney, Katz, Khalili, A Pair Wise Key Pre-Distribution Scheme for Wireless Sensor Networks, ACM Transactions on Information and System Security 2005
-
(2005)
ACM Transactions on Information and System Security
-
-
Du, D.1
Han, V.2
Katz, K.3
-
9
-
-
27244454348
-
Pairing-based cryptographic protocols: A survey. Cryptology ePrint Archive
-
Report 2004/064
-
Dutta, Barua, Sarkar, Pairing-based cryptographic protocols: A survey. Cryptology ePrint Archive, Report 2004/064 (2004)
-
(2004)
-
-
Dutta1
Barua2
Sarkar3
-
12
-
-
77950159185
-
-
Hu, Ziobro, Tillet, Sharma, Secure Wireless Sensor Networks: Problems and Solutions, Journal of Systemic, Cybernetics and Informatics, 1 No. 3
-
Hu, Ziobro, Tillet, Sharma, Secure Wireless Sensor Networks: Problems and Solutions, Journal of Systemic, Cybernetics and Informatics, Vol 1 No. 3
-
-
-
-
14
-
-
51249087814
-
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor
-
Liu, Ning: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008, pp 245-256
-
Networks
, vol.IPSN 2008
, pp. 245-256
-
-
Liu, N.1
-
15
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, Vol. 48, 1987, 203-209..
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz1
-
16
-
-
77950154551
-
-
Li, Ling, Znati, Wu, A Robust On-Demand Path-Key Establishment Framework Via Random Key Predistribution For Wireless Sensor Networks, EURASIP Journal On Communications And Networking 2006 Art id 91304
-
Li, Ling, Znati, Wu, A Robust On-Demand Path-Key Establishment Framework Via Random Key Predistribution For Wireless Sensor Networks, EURASIP Journal On Communications And Networking Vol. 2006 Art id 91304
-
-
-
-
18
-
-
24944490424
-
Welsh, Smith, A Public-Key Infrastructure for Key Distribution in TinyOS Based On Elliptic Curve Cryptography
-
Malan, Welsh, Smith, A Public-Key Infrastructure for Key Distribution in TinyOS Based On Elliptic Curve Cryptography, IEEE SECON'04 2004
-
(2004)
IEEE SECON'04
-
-
Malan1
-
21
-
-
33750134647
-
-
Perring, Szewczyk, Wen, Culler, Tygar, SPINS: Security Protocols for Sensor Networks, Wireless Networks 2002.
-
(2002)
Security Protocols for Sensor Networks, Wireless Networks
-
-
Perring, S.1
Wen, C.2
Tygar, S.3
-
22
-
-
34547420699
-
How Public Key Cryptography Influences Wireless Sensor Node Lifetime
-
Piotrowsi, Langendoerfer, Peter, How Public Key Cryptography Influences Wireless Sensor Node Lifetime, ACM SANS 2006.
-
(2006)
ACM SANS
-
-
Piotrowsi1
Langendoerfer2
Peter3
-
23
-
-
27744448961
-
-
Puccinelli, Haenggi, Wireless Sensor Networks: Applications and Challenges of Ubiquitous Sensing, IEEE Circuits and System Magazine 3rd Q. 2005.
-
Puccinelli, Haenggi, Wireless Sensor Networks: Applications and Challenges of Ubiquitous Sensing, IEEE Circuits and System Magazine 3rd Q. 2005.
-
-
-
-
24
-
-
33646581008
-
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
-
Wander, Gura, Eberle, Gupta and Shantz, Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks, In Proceedings of the IEEE PERCOM, 2005 pp 324-328.
-
(2005)
Proceedings of the IEEE PERCOM
, pp. 324-328
-
-
Wander, G.1
Eberle, G.2
Shantz3
-
25
-
-
77950154550
-
Elliptic Curves, Number Theory and Crpytography
-
Second Edition
-
Washington, Elliptic Curves, Number Theory and Crpytography, Second Edition, Chapman & Hall / CRC, 2005.
-
(2005)
Chapman & Hall / CRC
-
-
Washington1
-
27
-
-
0036688074
-
A Survey on Sensor Networks
-
August
-
Su, Sankarasubramaniam, et al, A Survey on Sensor Networks, IEEE Communications Magazine August 2002
-
(2002)
IEEE Communications Magazine
-
-
Su, S.1
-
28
-
-
27244454939
-
Efficient pairing computation on supersingular Abelian varieties
-
IACR Eprint Archive Report 2004-375
-
Barreto, Galbraith, Heigeartaigh, Scott, Efficient pairing computation on supersingular Abelian varieties, IACR Eprint Archive Report 2004-375.
-
-
-
Barreto, G.1
Heigeartaigh, S.2
-
29
-
-
77950170402
-
-
Hess, Smart, Vercauteren, The Eta Pairing Revisited, IEEE Transactions on Information Theory, No. 10, 2006, pp 4595-4602
-
Hess, Smart, Vercauteren, The Eta Pairing Revisited, IEEE Transactions on Information Theory, Vol. No. 10, 2006, pp 4595-4602
-
-
-
-
30
-
-
77950100667
-
Tinypk: Securing Sensor Networks With Public Key Technology
-
Watro, Kong, Cuti, Gardiner, Lynn, Kruss, Tinypk: Securing Sensor Networks With Public Key Technology, ACM SANS'04 2004.
-
(2004)
ACM SANS'04
-
-
Kong, W.1
Cuti, G.2
Lynn, K.3
-
31
-
-
35248867510
-
Efficient Identity Based Signature Schemes Based on Pairings, Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
-
Hess, Efficient Identity Based Signature Schemes Based on Pairings, Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography LNCS 2595, 2002, pp 310-324.
-
(2002)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess1
-
33
-
-
0001827537
-
Identity-Based Cryptosystems and Signature Schemes
-
Shamir, Identity-Based Cryptosystems and Signature Schemes. In Proceedings of CRYPTO 1984: pp 47-53
-
(1984)
Proceedings of CRYPTO
, pp. 47-53
-
-
Shamir1
|