-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz I. F., Su W., Sankarasubramaniam Y., Cayirci E., A survey on sensor networks IEEE Communications Magazine 2002 40 8 102 114
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
8544280003
-
Biosensors for environmental monitoring: A global perspective
-
Rodriguez-Mozaz S., Alda M. J. L. D., Marco M. P., Barcel D., Biosensors for environmental monitoring: a global perspective Talanta 2005 65 2 291 297
-
(2005)
Talanta
, vol.65
, Issue.2
, pp. 291-297
-
-
Rodriguez-Mozaz, S.1
Alda, M.J.L.D.2
Marco, M.P.3
Barcel, D.4
-
3
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Liu D., Ning P., Establishing pairwise keys in distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) October 2003 52 61 (Pubitemid 40673788)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
10
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
Parno B., Perrig A., Gligor V., Distributed detection of node replication attacks in sensor networks Proveedings of IEEE Symposium on Security and Privacy May 2005 49 63 (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
11
-
-
33750012404
-
Access control in wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
-
Zhou Y., Zhang Y., Fang Y., Access control in wireless sensor networks Ad Hoc Networks 2007 5 1 3 13 (Pubitemid 44573007)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
-
12
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu S., Setia S., Jajodia S., LEAP: efficient security mechanisms for large-scale distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) October 2003 62 72 (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
13
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
DOI 10.1145/1218556.1218559
-
Zhu S., Setia S., Jajodia S., LEAP+: efficient security mechanisms for large-scale distributed sensor networks ACM Transactions on Sensor Networks 2006 2 4 500 528 (Pubitemid 46278640)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
14
-
-
51849154205
-
Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control
-
July 2008 Beijing, China
-
Wang H., Sheng B., Tan C. C., Li Q., Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS '08) July 2008 Beijing, China 1 8
-
Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS '08)
, pp. 1-8
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
-
15
-
-
0018545449
-
How to share a secret
-
Shamir A., How to share a secret Communications of the ACM 1979 22 11 612 613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
DOI 10.1145/359340.359342
-
Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public key cryptosystems Communications of the ACM 1978 21 2 120 126 (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
17
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N., Elliptic curve cryptosystems Mathematics of Computation 1987 48 203 209
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
26
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-Bit CPUs
-
Gura N., Patel A., Wander A., Eberle H., Shantz S. C., Comparing elliptic curve cryptography and RSA on 8-Bit CPUs Proceedings of the 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES '04) 2004 119 132
-
(2004)
Proceedings of the 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES '04)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
27
-
-
79959212819
-
-
Atmel Corporation
-
Atmel Corporation,. http://www.atmel.com/
-
-
-
|