-
1
-
-
56949088196
-
A Survey of Security Issues in Wireless Sensor Networks
-
Y. Wang, G. Attebury, B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, vol.8, no.2, pp. 2-23, 2006
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
2
-
-
51349161002
-
Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks
-
Korea, April
-
W. K. Koo, H. Lee, Y. H. Kim and D. H. Lee, "Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks," in Proc of 2008 Information Security and Assurance (ISA 2008), pp.73-76, Korea, April 2008.
-
(2008)
Proc of 2008 Information Security and Assurance (ISA 2008)
, pp. 73-76
-
-
Koo, W.K.1
Lee, H.2
Kim, Y.H.3
Lee, D.H.4
-
3
-
-
33646581008
-
Energy Analysis of Public-key Cryptography for Wireless Sensor Networks
-
Germany, March
-
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy Analysis of Public-key Cryptography for Wireless Sensor Networks," in Proc of 2005 Pervasive Computing and Communications (PerCom 2005), pp. 324-328, Germany, March 2005.
-
(2005)
Proc of 2005 Pervasive Computing and Communications (PerCom 2005)
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
5
-
-
62949109556
-
LRSA: Lightweight Rabbit Based Security Architecture for Wireless Sensor Networks
-
China, Dec.
-
R. Tahir, M. Y. Javed, M. Tahir and F. Imam, "LRSA: Lightweight Rabbit Based Security Architecture for Wireless Sensor Networks," in Proc of 2008 Intelligent Information Technology Application (IITA '08), vol.3, pp. 679-683, China, Dec. 2008.
-
(2008)
Proc of 2008 Intelligent Information Technology Application (IITA '08)
, vol.3
, pp. 679-683
-
-
Tahir, R.1
Javed, M.Y.2
Tahir, M.3
Imam, F.4
-
6
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
Sept.
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," ACM Wireless Networks, vol. 8, no. 5, pp. 521-534, Sept. 2002.
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
7
-
-
84965066515
-
Advanced Encryption Standard (AES)
-
National Institute of Standards and Technology (NIST), Nov.
-
National Institute of Standards and Technology (NIST), "Advanced Encryption Standard (AES)," Federal Information Processing Standard (FIPS) 197, Nov. 2001.
-
(2001)
Federal Information Processing Standard (FIPS) 197
-
-
-
9
-
-
17544377081
-
System Architecture Directions for Networked Sensors
-
Nov.
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System Architecture Directions for Networked Sensors," in Proc. of ACM ASPLOS IX, pp. 93-104, Nov. 2000.
-
(2000)
Proc. of ACM ASPLOS IX
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
10
-
-
0347124644
-
-
National Institute of Standards and Technology, Mai.
-
"SkipJack and KEA Algorithm Specifications," National Institute of Standards and Technology, Mai.1998.
-
(1998)
SkipJack and KEA Algorithm Specifications
-
-
-
11
-
-
57649229741
-
PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems
-
H. Cheng, H.M. Heys, and C. Wang, "PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems", in Proc of Euromicro Conference on Digital System Design (DSD 2008), Parma, Italy, Sep. 2008.
-
Proc of Euromicro Conference on Digital System Design (DSD 2008), Parma, Italy, Sep. 2008
-
-
Cheng, H.1
Heys, H.M.2
Wang, C.3
-
12
-
-
35048835713
-
A New Class of Substitution-Permutation Networks
-
Queen's University, Kingston, Ontario, Aug.
-
A. Youssef, S.E. Tavares, and H.M. Heys, "A New Class of Substitution-Permutation Networks", in Proc of Workshop on Selected Areas in Cryptography(SAC '96), Queen's University, Kingston, Ontario, Aug. 1996.
-
(1996)
Proc of Workshop on Selected Areas in Cryptography(SAC '96)
-
-
Youssef, A.1
Tavares, S.E.2
Heys, H.M.3
-
13
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
New York, November
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: a Link Layer Security Architecture for Wireless Sensor Networks," in Proc of the 2nd international Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162-175, New York, November 2004.
-
(2004)
Proc of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
15
-
-
84949437497
-
Truncated Differentials and Skipjack
-
Springer-Verlag
-
L. R. Knudsen, M. J. B. Robshaw and D. Wagner, "Truncated Differentials and Skipjack," Lecture Notes in Computer Science 1666: Advances in Cryptology - CRYPTO'99, Springer-Verlag, pp. 790, 1999.
-
(1999)
Lecture Notes in Computer Science 1666: Advances in Cryptology - CRYPTO'99
, pp. 790
-
-
Knudsen, L.R.1
Robshaw, M.J.B.2
Wagner, D.3
-
17
-
-
51549093359
-
Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers
-
June
-
G. Meiser, T. Eisenbarth, K. Lemke-Rust, and C. Paar, "Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers," in Proc of 2008 Industrial Embedded Systems (SIES 2008), pp. 58-66, June 2008.
-
(2008)
Proc of 2008 Industrial Embedded Systems (SIES 2008)
, pp. 58-66
-
-
Meiser, G.1
Eisenbarth, T.2
Lemke-Rust, K.3
Paar, C.4
-
18
-
-
77955358471
-
An Analysis of Link Layer Encryption Schemes in Wireless Sensor Networks
-
X. Zhang, H.M. Heys, and C. Li, "An Analysis of Link Layer Encryption Schemes in Wireless Sensor Networks," in Proc of IEEE International Conference on Communications (ICC 2010), Cape Town, May 2010.
-
Proc of IEEE International Conference on Communications (ICC 2010), Cape Town, May 2010
-
-
Zhang, X.1
Heys, H.M.2
Li, C.3
|