-
1
-
-
79959856443
-
Secure and Effiecient use of Public Key Cryptography in Sensor Networks
-
Syracuse University
-
R. Wang, "Secure and Effiecient use of Public Key Cryptography in Sensor Networks," Computer Engineering, Syracuse University, 2007.
-
(2007)
Computer Engineering
-
-
Wang, R.1
-
4
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar et al., "SPINS: security protocols for sensor networks," Wirel. Netw., vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
-
7
-
-
79959852755
-
Analytical Comparison of CryptographicTechniques for Resource-Constrained Wireless Security
-
M. R. Doomun, and K. Soyjaudah, "Analytical Comparison of CryptographicTechniques for Resource-Constrained Wireless Security," International Journal of Network Security, vol. 9, no. 1, pp. 82-94, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 82-94
-
-
Doomun, M.R.1
Soyjaudah, K.2
-
12
-
-
23444439038
-
AEGIS: A single-chip secure processor
-
G. E. Suh, C. W. O'Donnell, and S. Devadas, "AEGIS: A single-chip secure processor," Information Security Technical Report, vol. 10, no. 2, pp. 63-73, 2005.
-
(2005)
Information Security Technical Report
, vol.10
, Issue.2
, pp. 63-73
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
14
-
-
12844285593
-
An ultra low-power processor for sensor networks
-
V. Ekanayake, I. Clinton Kelly, and R. Manohar, "An ultra low-power processor for sensor networks," in Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, Boston, MA, USA, 2004.
-
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, USA, 2004
-
-
Ekanayake, V.1
Clinton Kelly, I.2
Manohar, R.3
-
18
-
-
61649123623
-
SecFleck: A public key technology platform for wireless sensor networks
-
including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
-
W. Hu, P. Corke, W. C. Shih et al., "SecFleck: A public key technology platform for wireless sensor networks," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp. 296-311.
-
Lecture Notes in Computer Science
, pp. 296-311
-
-
Hu, W.1
Corke, P.2
Shih, W.C.3
-
19
-
-
79959839871
-
-
Full Thesis, Department of Computer Engineering, Rochester Institute of Technology, Rochester, new York
-
N. Verma, "Practical Implementation and Performance Analysis On Security of Sensor Networks " Full Thesis, Department of Computer Engineering, Rochester Institute of Technology, Rochester, new York, 2006.
-
(2006)
Practical Implementation and Performance Analysis on Security of Sensor Networks
-
-
Verma, N.1
-
21
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
W. Yong, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," Communications Surveys & Tutorials, IEEE, vol. 8, no. 2, pp. 2-23, 2006.
-
(2006)
Communications Surveys & Tutorials, IEEE
, vol.8
, Issue.2
, pp. 2-23
-
-
Yong, W.1
Attebury, G.2
Ramamurthy, B.3
-
23
-
-
23944459661
-
Public Key Cryptography in Sensor networks-Revisited*
-
Springer- Verlag
-
G. Gaubatz, J.-P. Kaps, and B. Sunar, "Public Key Cryptography in Sensor networks-Revisited*," Security in Ad Hoc and Sensor networks, pp. 2-18: Springer-Verlag, 2005.
-
(2005)
Security in Ad Hoc and Sensor Networks
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
24
-
-
79959842633
-
-
8 July 2009
-
T. C. Groups. "TRusted Platform Module(TPM) Summary," 8 July 2009, 2009; http://www.trustedcomputinggroup.org/resources/trusted-platform- module-tpm-summary.
-
(2009)
TRusted Platform Module(TPM) Summary
-
-
-
26
-
-
51849104627
-
TrustZone: Integrated Hardware and Software Security
-
T. Alves, D. Felton, and ARM, "TrustZone: Integrated Hardware and Software Security," Technology In-Depth, vol. 3, no. 4, pp. 18-24, 2004.
-
(2004)
Technology In-Depth
, vol.3
, Issue.4
, pp. 18-24
-
-
Alves, T.1
Felton, D.2
M, A.R.3
-
29
-
-
79959833887
-
-
"Trusted Computing Group," www.trustedcomputinggroup.org.
-
-
-
-
32
-
-
79959821405
-
ARM DONS ARMOR: Trustzone Security Extensions Strengthnen ARMv6 Architecture
-
4 Nov
-
T. R. Halfhill, "ARM DONS ARMOR: Trustzone Security Extensions Strengthnen ARMv6 Architecture," MIcroprocessor, [4 Nov 2009, 2003].
-
(2003)
MIcroprocessor
-
-
Halfhill, T.R.1
-
33
-
-
37149014768
-
Implementing Embedded Security on Dual-Virtual-CPU Systems
-
P. Wilson, A. Frey, T. Mihm et al., "Implementing Embedded Security on Dual-Virtual-CPU Systems," IEEE Design and Test of Computers, vol. 24, no. 6, pp. 582-591, 2007.
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 582-591
-
-
Wilson, P.1
Frey, A.2
Mihm, T.3
-
34
-
-
37149044968
-
Aegis: A Single-Chip Secure Processor
-
G. E. Suh, C. W. O'Donnell, and S. Devadas, "Aegis: A Single-Chip Secure Processor," IEEE Des. Test, vol. 24, no. 6, pp. 570-580, 2007.
-
(2007)
IEEE Des. Test
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
35
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell et al., "Architectural support for copy and tamper resistant software," SIGPLAN Not., vol. 35, no. 11, pp. 168-177, 2000.
-
(2000)
SIGPLAN Not.
, vol.35
, Issue.11
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
-
38
-
-
70349253246
-
Trusted computing building blocks for embedded linux-based ARM trustzone platforms
-
J. Winter, "Trusted computing building blocks for embedded linux-based ARM trustzone platforms," in Proceedings of the 3rd ACM workshop on Scalable trusted computing, Alexandria, Virginia, USA, 2008.
-
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, USA, 2008
-
-
Winter, J.1
-
41
-
-
20044369631
-
-
M. A. M. Vieira, C. N. Coelho, Jr., D. C. da Silva, Jr. et al., "Survey on wireless sensor network devices." pp. 537-544 vol. 1.
-
Survey on Wireless Sensor Network Devices
, vol.1
, pp. 537-544
-
-
Vieira, M.A.M.1
Coelho Jr., C.N.2
Da Silva Jr., D.C.3
|