-
1
-
-
67650461985
-
Privacy preservation in wireless sensor networks: A state-of-the-art survey
-
N. Li, N. Zhang, S. K. Das, and B. Thuraisingham, "Privacy preservation in wireless sensor networks: A state-of-the-art survey," Ad Hoc Networks, vol. 7, no. 8, pp. 1501-1514, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1501-1514
-
-
Li, N.1
Zhang, N.2
Das, S.K.3
Thuraisingham, B.4
-
2
-
-
70349925841
-
Lap: A lightweight authentication protocol for smart dust wireless sensor networks
-
M. Sharifi, S. S. Kashi, and S. P. Ardakani, "Lap: A lightweight authentication protocol for smart dust wireless sensor networks," International Symposium on Collaborative Technologies and Systems, pp. 258-265, 2009.
-
(2009)
International Symposium on Collaborative Technologies and Systems
, pp. 258-265
-
-
Sharifi, M.1
Kashi, S.S.2
Ardakani, S.P.3
-
3
-
-
77954607596
-
User authentication in sensor networks
-
extended abstract
-
Z. Benenson, F. Gartner, and D. Kesdogan, "User authentication in sensor networks, (extended abstract)," In Informatik 2004, Workshop on Sensor Networks, 2004.
-
Informatik 2004, Workshop on Sensor Networks, 2004
-
-
Benenson, Z.1
Gartner, F.2
Kesdogan, D.3
-
6
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Advances in Cryptology CRYPTO 92, ser.
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in in Advances in Cryptology CRYPTO 92, ser. LNCS 740, 1993, pp. 471-486.
-
(1993)
LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
9
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Y. Z. K. H. M., J. Cao, and S. Wang, "A dynamic user authentication scheme for wireless sensor networks," in In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '06), 2006.
-
(2006)
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '06)
-
-
M, Y.Z.K.H.1
Cao, J.2
Wang, S.3
-
10
-
-
34249276408
-
Threshold password authentication against guessing attacks in ad hoc networks
-
Z. Chai and a. R. L. Zhenfu Cao, "Threshold password authentication against guessing attacks in ad hoc networks," Ad Hoc Networks, vol. 5, 2007.
-
(2007)
Ad Hoc Networks
, vol.5
-
-
Chai, Z.1
Zhenfu Cao, A.R.L.2
-
11
-
-
84965066515
-
National institute of standards and technology (nist), advanced encryption standard (aes)
-
"National institute of standards and technology (nist), advanced encryption standard (aes)." Federal Information Processing Standards Publications (FIPS PUBS) 197, 2001.
-
(2001)
Federal Information Processing Standards Publications (FIPS PUBS)
, pp. 197
-
-
-
12
-
-
84898619345
-
Optimizing aes for embedded devices and wireless sensor networks
-
ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering)
-
S. Didla, A. Ault, and S. Bagchi, "Optimizing aes for embedded devices and wireless sensor networks," in TridentCom '08: Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering), 2008, pp. 1-10.
-
(2008)
TridentCom '08: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities
, pp. 1-10
-
-
Didla, S.1
Ault, A.2
Bagchi, S.3
-
13
-
-
48249151851
-
Accelerated aes implementations via generalized instruction set extensions
-
A. J. Elbirt, "Accelerated aes implementations via generalized instruction set extensions," J. Com put. Secur., vol. 16, no. 3, pp. 265-288, 2008.
-
(2008)
J. Com Put. Secur.
, vol.16
, Issue.3
, pp. 265-288
-
-
Elbirt, A.J.1
-
14
-
-
67650484039
-
An energy-efficient aes-ccm implementation for ieee802.15.4 wireless sensor networks
-
Washington, DC, USA: IEEE Computer Society
-
L. Huai, X. Zou, Z. Liu, and Y. Han, "An energy-efficient aes-ccm implementation for ieee802.15.4 wireless sensor networks," in NSWCTC '09: Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing. Washington, DC, USA: IEEE Computer Society, 2009, pp. 394-397.
-
(2009)
NSWCTC '09: Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
, pp. 394-397
-
-
Huai, L.1
Zou, X.2
Liu, Z.3
Han, Y.4
-
15
-
-
33744729631
-
Recent developments in cryptographic hash functions: Security implications and future directions
-
[Online]. Available
-
C. Cid, "Recent developments in cryptographic hash functions: Security implications and future directions," Information Security Technical Report, vol. 11, no. 2, pp. 100-107, 2006. [Online]. Available: http://www.sciencedirect.com/science/article/B6VJC- 4K4H47T-7/2/ 501a7fb3b6cf98383eddb6b3dc1ecf05
-
(2006)
Information Security Technical Report
, vol.11
, Issue.2
, pp. 100-107
-
-
Cid, C.1
-
16
-
-
85028891099
-
Structural properties of one-way hash functions
-
London, UK: Springer-Verlag
-
Y. Zheng, T. Matsumoto, and H. lmai, "Structural properties of one-way hash functions;' in CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1991, pp. 285-302.
-
(1991)
CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
, pp. 285-302
-
-
Zheng, Y.1
Matsumoto, T.2
Lmai, H.3
-
17
-
-
47749137893
-
-
Telos Mote: www.ece.osu.edu/bibyk/ee582/telosMote.pdf.
-
Telos Mote
-
-
-
19
-
-
78049480409
-
-
TinyOS: http://www.tinyos.net/, 2009.
-
(2009)
TinyOS
-
-
|