-
1
-
-
33847698965
-
Efficient pairing computation on supersingular Abelian varieties
-
DOI 10.1007/s10623-006-9033-6
-
Barreto, P.S.L.M., Galbraith, S., O'Heigeartaigh, C. and Scott, M. (2007) 'Efficient pairing computation on supersingular abelian varieties', Designs, Codes and Cryptography, Vol. 42, pp.239-271. (Pubitemid 46384645)
-
(2007)
Designs, Codes, and Cryptography
, vol.42
, Issue.3
, pp. 239-271
-
-
Barreto, P.S.L.M.1
Galbraith, S.D.2
O'Heigeartaigh, C.3
Scott, M.4
-
2
-
-
23044483770
-
-
Cambridge University Press
-
Blake, I., Seroussi, G. and Smart, N. (2005) Advances in Elliptic Curve Cryptography, Cambridge University Press, pp.183-213.
-
(2005)
Advances in Elliptic Curve Cryptography
, pp. 183-213
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
-
4
-
-
85028765277
-
Perfectly secure key distribution for dynamic conferences
-
Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U. and Yung, M. (1993) 'Perfectly secure key distribution for dynamic conferences', Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92), pp.471-486.
-
(1993)
Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92)
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
5
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D. and Franklin, M. (2003) 'Identity-based encryption from the weil pairing', SIAM J. Comput., Vol. 32, No. 3, pp.586-615.
-
(2003)
Siam J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
January-March 2003
-
Capkun, S., Buttyán, L. and Hubaux, J-P. (2003) 'Self-organized public-key management for mobile ad hoc networks', IEEE Transactions on Mobile Computing, January-March 2003, Vol. 2, No. 1, pp.52-64.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
7
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Chan, H., Perrig, A. and Song, D. (2003) 'Random key predistribution schemes for sensor networks', Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp.197-213.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
20544465010
-
-
Crossbow Technology, December 2003, Crossbow Technology Inc., 41 Daggett Dr., San Jose, CA 95134
-
Crossbow Technology (2003) MPR/MIB Mote Hardware Users Manual, December 2003, Crossbow Technology Inc., 41 Daggett Dr., San Jose, CA 95134.
-
(2003)
MPR/MIB Mote Hardware Users Manual
-
-
-
9
-
-
33745726712
-
Security considerations and key negotiation techniques for power constrained sensor networks
-
Doyle, B., Bell, S., Smeaton, A.F., McCusker, K. and O'Connor, N. (2006) 'Security considerations and key negotiation techniques for power constrained sensor networks', The Computer Journal, Vol. 49, No. 4, pp.443-453.
-
(2006)
The Computer Journal
, vol.49
, Issue.4
, pp. 443-453
-
-
Doyle, B.1
Bell, S.2
Smeaton, A.F.3
McCusker, K.4
O'Connor, N.5
-
10
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
DOI 10.1145/1062689.1062698, MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
Du, W., Wang, R. and Ning, P. (2005) 'An efficient scheme for authenticating public keys in sensor networks', Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), 25-27 May 2005, Urbana-Champaign, IL, USA, pp.58-67. (Pubitemid 43037583)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 58-67
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
12
-
-
38049084297
-
-
Galbraith, S., Paterson, K. and Smart, N. (2006) Pairings for Cryptographers, Cryptology ePrint Archive, Report 2006/165. Available online at: http://eprint.iacr.org/2006/165
-
(2006)
Pairings for Cryptographers, Cryptology ePrint Archive
-
-
Galbraith, S.1
Paterson, K.2
Smart, N.3
-
13
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Gura, N., Patel, A., Wander, A., Eberle, H. and Shantz, S.C. (2004) 'Comparing elliptic curve cryptography and RSA on 8-bit CPUs', Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '04), pp.92-106.
-
(2004)
Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '04)
, pp. 92-106
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
14
-
-
11244267013
-
-
Springer-Verlag, New York
-
Hankerson, D., Menezes, A. and Vanstone, S. (2004) Guide to Elliptic Curve Cryptography, Springer-Verlag, New York.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
15
-
-
33745639957
-
-
Technical Report, University of Colorado at Boulder, Boulder, CO
-
Hartung, C., Balasalle, J. and Han, R. (2005) Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report, University of Colorado at Boulder, Boulder, CO.
-
(2005)
Node Compromise in Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
16
-
-
61649123623
-
Sec Fleck: A public key technology platform for wireless sensor networks
-
Hu, W., Corke, P., Shih, W. and Overs, L. (2009) 'secFleck: a public key technology platform for wireless sensor networks', Proceedings of the 6th European Conference on Wireless Sensor Networks (EWSN), pp.296-311.
-
(2009)
Proceedings of the 6th European Conference on Wireless Sensor Networks (EWSN)
, pp. 296-311
-
-
Hu, W.1
Corke, P.2
Shih, W.3
Overs, L.4
-
17
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
October 2001, Long Beach, CA, USA
-
Hubaux, J-P., Buttyán, L. and Capkun, S. (2001) 'The quest for security in mobile ad hoc networks' Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '01), 4-5 October 2001, Long Beach, CA, USA.
-
(2001)
Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '01)
, pp. 4-5
-
-
Hubaux, J.-P.1
Buttyán, L.2
Capkun, S.3
-
18
-
-
70049104722
-
-
Available online at
-
Imote2 datasheet (2008). Available online at: http://www.xbow.com.
-
(2008)
Imote2 Datasheet
-
-
-
19
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
Karlof, C., Sastry, N. and Wagner, D. (2004) 'TinySec: a link layer security architecture for wireless sensor networks', Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys), pp.162-175. (Pubitemid 41563357)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
20
-
-
35348857586
-
Health monitoring of civil infrastructures using wireless sensor networks
-
DOI 10.1145/1236360.1236395, IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
-
Kim, S., Pakzad, S., Culler, D., Demmel, J., Fenves, G., Glaser, S. and Turon, M. (2007) 'Health monitoring of civil infrastructures using wireless sensor networks', Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN '07), pp.254-263. (Pubitemid 47582155)
-
(2007)
IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
, pp. 254-263
-
-
Kim, S.1
Pakzad, S.2
Culler, D.3
Demmel, J.4
Fenves, G.5
Glaser, S.6
Turon, M.7
-
22
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Liu, D. and Ning, P. (2003) 'Establishing pairwise keys in distributed sensor networks', Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington DC, pp.52-61. (Pubitemid 40673788)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
24
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
DOI 10.1145/1236360.1236421, IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
-
Luk, M., Mezzour, G., Perrig, A. and Gligor, V. (2007) 'MiniSec: a secure sensor network communication architecture', Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN '07), Cambridge, MA, pp.479-488. (Pubitemid 47582178)
-
(2007)
IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
25
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
Atlanta
-
Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D. and Anderson, J. (2002) 'Wireless sensor networks for habitat monitoring', Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, pp.88-97.
-
(2002)
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications
, pp. 88-97
-
-
Mainwaring, A.1
Polastre, J.2
Szewczyk, R.3
Culler, D.4
Anderson, J.5
-
26
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
Santa Clara, CA
-
Malan, D.J., Welsh, M. and Smith, M.D. (2004) 'A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography', Proceedings of the 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON'04), Santa Clara, CA.
-
(2004)
Proceedings of the 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON'04)
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
27
-
-
44049105799
-
-
Moteiv, Available online at
-
Moteiv (2006) Tmote Sky datasheet. Available online at: http://www.moteiv.com.
-
(2006)
Tmote Sky Datasheet
-
-
-
28
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
Newsome, J., Shi, E., Song, D. and Perrig, A. (2004) 'The sybil attack in sensor networks: analysis & defenses', Proceedings of the 3rd International Conference on Information Processing in Sensor Networks (IPSN '04), pp.259-268.
-
(2004)
Proceedings of the 3rd International Conference on Information Processing in Sensor Networks (IPSN '04)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
29
-
-
46749097974
-
-
Oliveira, L., Aranha, D., Morais, E., Daguano, F., Lopez, J. and Dahab, R. (2007a) 'Tiny-Tate: computing the Tate pairing in resource-constrained sensor nodes', pp.318-323.
-
(2007)
Tiny-Tate: Computing the Tate pairing in resource-constrained sensor nodes
, pp. 318-323
-
-
Oliveira, L.1
Aranha, D.2
Morais, E.3
Daguano, F.4
Lopez, J.5
Dahab, R.6
-
30
-
-
34547668935
-
Identity-based encryption for sensor networks
-
Oliveira, L.B., Dahab, R., Lopez, J., Daguano, F. and Loureiro, A.A.F. (2007b) 'Identity-based encryption for sensor networks', Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW '07).
-
(2007)
Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW '07)
-
-
Oliveira, L.B.1
Dahab, R.2
Lopez, J.3
Daguano, F.4
Loureiro, A.A.F.5
-
31
-
-
4544301464
-
Random keyassignment for secure wireless sensor networks
-
Fairfax, VA
-
Pietro, R.D., Mancini, L.V. and Mei, A. (2003) 'Random keyassignment for secure wireless sensor networks', Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, pp.62-71.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 62-71
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
32
-
-
1642358858
-
Cryptosystems based on pairing
-
Okinawa, Japan
-
Sakai, R., Ohgishi, K. and Kasahara, M. (2000) 'Cryptosystems based on pairing', The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan.
-
(2000)
The 2000 Symposium on Cryptography and Information Security
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
34
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Santa Barbara, CA
-
Shamir, A. (1985) 'Identity-based cryptosystems and signature schemes', Proceedings of CRYPTO 84 on Advances in Cryptology, Santa Barbara, CA, pp.47-53.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
35
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
Szczechowiak, P., Oliveira, L., Scott, M., Collier, M. and Dahab, R. (2008) 'NanoECC: testing the limits of elliptic curve cryptography in sensor networks', Proceedings of the 5th European Conference on Wireless Sensor Networks (EWSN 2008), Vol. 4913, pp.305-320.
-
(2008)
Proceedings of the 5th European Conference on Wireless Sensor Networks (EWSN)
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
36
-
-
70349154616
-
-
Zurich, Switzerland
-
Szczechowiak, P., Kargl, A., Scott, M. and Collier, M. (2009) 'On the application of pairing based cryptography to wireless sensor networks', Proceedings of the 2nd ACM Conference on Wireless Network Security, Zurich, Switzerland, pp.1-12.
-
(2009)
Proceedings of the 2nd ACM Conference on Wireless Network Security
, pp. 1-12
-
-
Szczechowiak, P.1
Kargl, A.2
Scott, M.3
Collier, M.4
-
37
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Washington DC, USA
-
Watro, R.J., Kong, D., Cuti, S., Gardiner, C., Lynn, C. and Kruus, P. (2004) 'TinyPK: securing sensor networks with public key technology', Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks (SASN '04), Washington DC, USA.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks (SASN '04)
-
-
Watro, R.J.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
38
-
-
51349098629
-
Id-based key agreement and encryption for wireless sensor networks
-
Yang, G., Rong, C., Veigner, C. and Cheng, H. (2006) 'Id-based key agreement and encryption for wireless sensor networks', IJCSNS, Vol. 6, No. 5B.
-
(2006)
Ijcsns
, vol.6
, Issue.5 B
-
-
Yang, G.1
Rong, C.2
Veigner, C.3
Cheng, H.4
-
39
-
-
70449124369
-
-
ZigBee-Alliance, Available online a
-
ZigBee-Alliance (2005) Zigbee specification 1.1. Available online at: http://www.zigbee.org.
-
(2005)
Zigbee Specification 1.1.
-
-
|