-
1
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography on small wireless devices," IEEE PerCom, pp. 324-328, March 2005. (Pubitemid 43727945)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
2
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
DOI 10.1145/1062689.1062698, MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Du, R. Wang, and P. Ning, "An efficient scheme for authenticating public keys in sensor networks," In: Proceeding of the MobiHoc, pp.58-67, May 2005. (Pubitemid 43037583)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 58-67
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
3
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Cryptographic Hardware and Embedded Systems - CHES 2004
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz. "Comparing elliptic curve cryptography and rsa on 8-bit cpus," In: 2004 workshop on cryptographic hardware and embedded systems, pp. 119-132, August 2004. (Pubitemid 39112461)
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
4
-
-
10844273274
-
On the correlated data gathering problem in wireless sensor networks
-
Proceedings - ISCC 2004, Ninth International Symposium on Computers and Communications
-
J. Al-Karaki, and A. Kamal, "Routing Techniques In Wireless Sensor Networks: A Survey," IEEE Wireless Communications Volume11, Issue 6, pp. 6-28, Dec 2004. (Pubitemid 40006363)
-
(2004)
Proceedings - International Symposium on Computers and Communications
, vol.1
, pp. 226-231
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
6
-
-
0038341106
-
A key management scheme for distributed sensor networks
-
Washington, DC, USA
-
th ACM conference on computer and communication security, Washington, DC, USA, pp.7-41, 2002,.
-
(2002)
th ACM Conference on Computer and Communication Security
, pp. 7-41
-
-
Eschenauer, L.1
Gligor, B.2
-
8
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
-
Y. Xiao, V. Rayi, B. Sun, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, 2007. (Pubitemid 44573000)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.-H.4
-
9
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04
-
nd ACM workshop on security of ad hoc and sensor networks (SASN 04), ACM Press, New York, NY, USA, pp.59-64, 2004. (Pubitemid 40338678)
-
(2004)
Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.-F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
10
-
-
63149098881
-
A Key management scheme for cluster based wireless sensor networks
-
R. Azarderakhsh, A. Reyhani-Masoleh, and Z. Abid, "A Key management scheme for cluster based wireless sensor networks," EUC (2), pp.222-227, 2008.
-
(2008)
EUC
, Issue.2
, pp. 222-227
-
-
Azarderakhsh, R.1
Reyhani-Masoleh, A.2
Abid, Z.3
-
11
-
-
70350464378
-
Using trust for key distribution and route selection in wireless sensor networks
-
Nov.
-
N. Lewis, N. Foukia, "Using trust for key distribution and route selection in wireless sensor networks," IEEE Globecom, pp.16-30, Nov. 2007.
-
(2007)
IEEE Globecom
, pp. 16-30
-
-
Lewis, N.1
Foukia, N.2
-
13
-
-
0017930809
-
METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol.21, no.2, pp.120-126, February 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol.IT-22, no.6, pp.644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
15
-
-
14844287829
-
-
TR-04-04, Computer Science Group, Harvard University
-
D. Malan, "Crypto for tiny objects," TR-04-04, Computer Science Group, Harvard University, 2004.
-
(2004)
Crypto for Tiny Objects
-
-
Malan, D.1
-
16
-
-
0141473270
-
Fast variants of RSA in RSA Laboratories
-
Winter-Spring
-
D. Boneh and H. Shacham, "Fast variants of RSA," in RSA Laboratories' Crypto-bytes, vol 5 no.1, pp. 1-8, Winter-Spring 2002.
-
(2002)
Crypto-bytes
, vol.5
, Issue.1
, pp. 1-8
-
-
Boneh, D.1
Shacham, H.2
-
17
-
-
56749181478
-
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks mobile wireless sensor network
-
M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, "Emergent properties: detection of the node-capture attack in mobile wireless sensor networks," In mobile wireless sensor network. In WiSec 2008.
-
(2008)
WiSec
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
19
-
-
34247224664
-
-
Rensselaer Polytechnic Institute, Computer Science Department, Tech. Re, March
-
S. Camtepe, and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey," Rensselaer Polytechnic Institute, Computer Science Department, Tech. Re, March 2005.
-
(2005)
Key Distribution Mechanisms for Wireless Sensor Networks: A Survey
-
-
Camtepe, S.1
Yener, B.2
-
20
-
-
77950591935
-
A key agreement scheme based on bilinear pairing for wireless sensor network
-
Dec
-
C. Hao, and G. Yajun, "A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network," Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp.384-388, Dec 2009.
-
(2009)
Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
, pp. 384-388
-
-
Hao, C.1
Yajun, G.2
-
21
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Cryptographic Hardware and Embedded Systems - CHES 2004
-
N. Gura, A. Patel, and A. Wander, "Comparing Elliptic. Curve Cryptography and RSA on 8bit CPUs[C]," In Proceedings of the Workshop on Cryptography Hardware and Embedded systems (CHES 2004), 2004. (Pubitemid 39112461)
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
22
-
-
72349088203
-
-
[Online] Available.[Accessed: March 29 2010]
-
T. Bokareva, "Mini Hardware Survey," [Online]. Available: http://www.cse.unsw.edu.au/~sensar/hardware/hardwaresurvey.html.[Accessed: March 29, 2010].
-
Mini Hardware Survey
-
-
Bokareva, T.1
-
23
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
-
X. Du, S. Ci, X. Yang, M. Guizani, H. Chen, "A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks," IEEE ICC 2007. (Pubitemid 44573000)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.-H.4
-
24
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks
-
March
-
Muhammad Khurram Khan, Khaled Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks,'" Sensors, Vol.10, Issue 3, pp.2450-2459, March 2010.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
25
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
-
Muhammad Khurram Khan, Jiashu Zhang, "Improving the Security of 'A Flexible Biometrics Remote User Authentication Scheme,'" Computer Standards and Interfaces (CSI), Elsevier Science, UK, vol.29, issue 1, pp. 84-87, January 2007. (Pubitemid 46771122)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.-M.1
Zhang, W.-F.2
Zhang, J.-S.3
Khan, M.K.4
|