-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
I. F. Akyildiz, W. Su, and Y. S. Sankara, "Wireless sensor networks: A survey", Computer Networks, vol. 4, 2002, pp. 393-422. (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
DOI 10.1145/1053283.1053287
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks", ACM Transactions on Information and System Security, vol. 1, February 2005, pp. 41-77. (Pubitemid 40479429)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Rongfang, L.I.3
-
3
-
-
51349098629
-
Identity-based key agreement and encryption for wireless sensor networks
-
May
-
Y. Geng, C. M. Rong, and V. Christian, "Identity-Based Key Agreement and Encryption for Wireless Sensor Networks", International Journal of Computer Science and Network Security, vol. B5, May 2006, pp. 182-189.
-
(2006)
International Journal of Computer Science and Network Security
, vol.B5
, pp. 182-189
-
-
Geng, Y.1
Rong, C.M.2
Christian, V.3
-
4
-
-
63449122349
-
Digital signcryption or how to achieve cost signature & encryption
-
LNCS 1294, Berlin: Springer-Verlag
-
Y. Zheng, "Digital Signcryption or how to achieve cost signature & encryption", Advances in Crypto logy CRYPTO'97, LNCS 1294, Berlin: Springer-Verlag, 1997, pp. 165-179.
-
(1997)
Advances in Crypto Logy CRYPTO'97
, pp. 165-179
-
-
Zheng, Y.1
-
6
-
-
33646828571
-
Robust ID-based threshold signcryption scheme from pairings
-
Shanghai, China
-
S. Duan, Z. Cao, and R. Lu, "Robust ID-based threshold signcryption scheme from pairings", 2004 International Conference on Information Security, Shanghai, China, 2004, pp. 33-37.
-
(2004)
2004 International Conference on Information Security
, pp. 33-37
-
-
Duan, S.1
Cao, Z.2
Lu, R.3
-
7
-
-
80051890834
-
An identity-based signature and its threshold version
-
X. Cheng, J. Liu, and X. Wang, "An Identity-based Signature and its Threshold version", International Journal of Computer Science and Network Security, vol. B5, 2006, pp. 973-977.
-
(2006)
International Journal of Computer Science and Network Security
, vol.B5
, pp. 973-977
-
-
Cheng, X.1
Liu, J.2
Wang, X.3
-
8
-
-
3042597451
-
Identity-based threshold signature scheme from the bilinear pairings
-
Las Vegas, Nevada, USA
-
J. Baek and Y. Zheng, "Identity-based threshold signature scheme from the bilinear pairings", International Conference on Information Technology: Coding and Computing-ITCC'04, Las Vegas, Nevada, USA, 2004, pp. 124-128.
-
(2004)
International Conference on Information Technology: Coding and Computing-ITCC'04
, pp. 124-128
-
-
Baek, J.1
Zheng, Y.2
-
10
-
-
33646827174
-
An identity-based threshold signcryption scheme with semantic security
-
Computational Intelligence and Security - International Conference, CIS 2005, Proceedings
-
C. Peng and X. Li, "An identity-based threshold signcryption scheme with semantic security", Computational Intelligence and Security-CIS 2005, LNAI 3802, Berlin: Springer-Verlag, 2005, pp. 173-179. (Pubitemid 43775245)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3802
, pp. 173-179
-
-
Peng, C.1
Li, X.2
|