-
1
-
-
77956210259
-
-
ISO, Information Technology -Security Techniques -Key Management -Part 2: Mechanisms Using Symmetric Techniques
-
ISO, Information Technology -Security Techniques -Key Management -Part 2: Mechanisms Using Symmetric Techniques. In ISO/IEC 11770-2, International Standard, 1996.
-
(1996)
ISO/IEC 11770-2, International Standard
-
-
-
2
-
-
77956216922
-
-
ISO, Information Technology -Security Techniques -Key Management -Part 3: Mechanisms Using Asymmetric Techniques
-
ISO, Information Technology -Security Techniques -Key Management -Part 3: Mechanisms Using Asymmetric Techniques. In ISO/IEC 11770-3, International Standard, 1999.
-
(1999)
ISO/IEC 11770-3, International Standard
-
-
-
3
-
-
33750842647
-
ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations
-
G. Bertoni, L. Breveglieri, and M. Venturi. ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. In Proc. 3rd IEEE ITNG, 2006.
-
(2006)
Proc. 3rd IEEE ITNG
-
-
Bertoni, G.1
Breveglieri, L.2
Venturi, M.3
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
5
-
-
0003618624
-
-
Springer, New York
-
P. Breḿ aud. Markov Chains, Gibbs Fields, Monte Carlo Simulation, and Queues. Springer, New York, 1999.
-
(1999)
Markov Chains, Gibbs Fields, Monte Carlo Simulation, and Queues
-
-
Breḿ, P.1
-
6
-
-
77956192822
-
-
Crypto++ library benchmarks, http://gd.tuwien.ac.at/privacy/crypto/ libs/cryptlib/benchmarks.html.
-
Crypto++ Library Benchmarks
-
-
-
7
-
-
31844450265
-
Public key cryptography in sensor networks -Revisited
-
G. Gaubatz, J.-P. Kaps, and B. Sunar. Public key cryptography in sensor networks -Revisited. In Proc. 1st ESAS, 2004.
-
(2004)
Proc. 1st ESAS
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
9
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
University of Colorado at Boulder
-
C. Hartung, J. Balasalle, and R. Han. Node Compromise in Sensor Networks: The Need for Secure Systems. Technical Report CU-CS-990-05, University of Colorado at Boulder, 2005.
-
(2005)
Technical Report CU-CS-990-05
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
10
-
-
77956220089
-
-
http://www.tinyos.net/.
-
-
-
-
11
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proc. 2nd ACM SenSys, 2004.
-
(2004)
Proc. 2nd ACM SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
12
-
-
3042782268
-
TOSSIM: Accurate and scalable simulation of entire tinyos applications
-
P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications. In Proc. 1st ACM SenSys, 2003.
-
(2003)
Proc. 1st ACM SenSys
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
13
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning. TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In Proc. 7th IPSN, 2008.
-
(2008)
Proc. 7th IPSN
-
-
Liu, A.1
Ning, P.2
-
14
-
-
51749114903
-
Gossicrypt: Wireless sensor network data confidentiality against parasitic adversaries
-
J. Luo, P. Papadimitratos, and J.-P. Hubaux. GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries. In Proc. 5th IEEE SECON, 2008.
-
(2008)
Proc. 5th IEEE SECON
-
-
Luo, J.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
17
-
-
51749088454
-
Secure neighborhood discovery: A fundamental element for mobile ad hoc networking
-
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J.-P. Hubaux. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking. IEEE Commun. Mag., 46(2):132-139, 2008.
-
(2008)
IEEECommun. Mag
, vol.46
, Issue.2
, pp. 132-139
-
-
Papadimitratos, P.1
Poturalski, M.2
Schaller, P.3
Lafourcade, P.4
Basin, D.5
Capkun, S.6
Hubaux, J.-P.7
-
19
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner. Security in Wireless Sensor Networks. Commun. ACM, 47(6):53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
21
-
-
0036793924
-
Denial of service in sensor networks
-
A. Wood and J. Stankovic. Denial of Service in Sensor Networks. IEEE Computer, 35(10):54-62, 2003.
-
(2003)
IEEEComputer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
|