-
1
-
-
79953784283
-
M2M: From mobile to embedded internet
-
IEEE April
-
W. Geng, S.Talwar, K. Johnsson, N. Himayat, K.D. Johnson, "M2M: From mobile to embedded internet," Communications Magazine, IEEE, vol.49, no.4, pp.36-43, April 2011.
-
(2011)
Communications Magazine
, vol.49
, Issue.4
, pp. 36-43
-
-
Geng, W.1
Talwar, S.2
Johnsson, K.3
Himayat, N.4
Johnson, K.D.5
-
2
-
-
84856188179
-
Security and Trust for M2M Communications
-
I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, M. Meyerstein," Security and Trust for M2M Communications", in Proceedings of the Wireless World Research Forum Meeing 22, Paris, France, May 5-7, 2009
-
Proceedings of the Wireless World Research Forum Meeing 22, Paris, France, May 5-7, 2009
-
-
Cha, I.1
Shah, Y.2
Schmidt, A.U.3
Leicher, A.4
Meyerstein, M.5
-
3
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November 18-22 2002, pp. 41-47.
-
Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, November 18-22 2002
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
4
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003, pp. 197-213.
-
IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in Proceedings of IEEE INFOCOM'04. 2004.
-
Proceedings of IEEE INFOCOM'04. 2004
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
7
-
-
33745963889
-
A security architecture for mobile wireless sensor networks
-
August
-
S. Schmidt, H. Krahn, S. Fischer, D. Watjen, "A security architecture for mobile wireless sensor networks," in Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS'04) (Heidelberg, Germany), Vol. 3313, August 2004.
-
(2004)
Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS'04) (Heidelberg, Germany)
, vol.3313
-
-
Schmidt, S.1
Krahn, H.2
Fischer, S.3
Watjen, D.4
-
8
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, "Spins: Security protocols for sensor networks," in Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001, pp. 189-199.
-
Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.D.5
-
9
-
-
51849124994
-
Implementing public-key infrastructure for sensor networks
-
D.J. Malan, M. Welsh, M.D. Smith, "Implementing public-key infrastructure for sensor networks," ACM Transactions on Sensor Networks 4 (4), 1-23, 2008.
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.4
, pp. 1-23
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
10
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
August
-
N. Gura, A. Patel, and A.Wander, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), pages 119-132, August 2004.
-
(2004)
Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
-
12
-
-
33750904440
-
Unleashing public-key cryptography in wireless sensor networks
-
On IWAP'05
-
J. Lopez, "Unleashing public-key cryptography in wireless sensor networks," Journal of Computer Security, vol. 14, no. 5, pp. 469-482, 2006. (Pubitemid 44728272)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.5
, pp. 469-482
-
-
Lopez, J.1
-
13
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
N. R. Potlapally, S. Ravi, A. Raghunathan, N.K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," IEEE Transactions on Mobile Computing 5 (2) (2006) 128-143. (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
16
-
-
34247376029
-
Securing the deluge network programming system
-
ACM, New York, NY
-
P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler, "Securing the deluge network programming system," in Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN). ACM, New York, NY, 326-333. 2006.
-
(2006)
Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 326-333
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
17
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
USA
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruss, "TinyPK: Securing sensor networks with public key technology," in Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, pp. 59-64, 2004, USA.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruss, P.6
-
18
-
-
0017930809
-
METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS
-
DOI 10.1145/359340.359342
-
R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp 120-126, February 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
19
-
-
78049413781
-
SecFleck: A Public Key Technology Platform for Wireless Sensor Networks
-
W. Hu, P. Corke, W. C. Shih, L. Overs, "secFleck: A Public Key Technology Platform for Wireless Sensor Networks," in Proceedings of the 6th European Conference on Wireless Sensor Networks, February 11-13, 2009, Cork, Ireland.
-
Proceedings of the 6th European Conference on Wireless Sensor Networks, February 11-13, 2009, Cork, Ireland
-
-
Hu, W.1
Corke, P.2
Shih, W.C.3
Overs, L.4
-
20
-
-
23944459661
-
Public key cryptography in sensor networks-revisited
-
Security in Ad-hoc and Sensor Networks - First European Workshop, ESAS 2004
-
G. Gaubatz, J. Kaps, and B. Sunar, "Public key cryptography in sensor networks-revisited," Lecture Notes in Computer Science, vol. 3313, pp. 2-18, 2005. (Pubitemid 41190913)
-
(2005)
Lecture Notes in Computer Science
, vol.3313
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
21
-
-
33646812572
-
State of the art in ultralow power public key cryptography for wireless sensor networks
-
IEEE Computer Society Washington, DC, USA
-
G. Gaubatz, J. Kaps, E. Ozturk, and B. Sunar, "State of the art in ultralow power public key cryptography for wireless sensor networks,"in Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE Computer Society Washington, DC, USA, 2005, pp. 146-150.
-
(2005)
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.2
Ozturk, E.3
Sunar, B.4
-
22
-
-
1542286901
-
Fast authenticated key establishment protocols for self-organizing sensor networks
-
ACM Press
-
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, J. Zhang, "Fast authenticated key establishment protocols for self-organizing sensor networks," in Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, ACM Press, 2003; 141-150.
-
(2003)
Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
23
-
-
74849102688
-
Secure and practical key establishment for distributed sensor networks
-
Wiley InterScience
-
P. Kotzanikolaou, E. Magkos, D. Vergados, and M. Stefanidakis, "Secure and practical key establishment for distributed sensor networks," in Security and Communication Networks, Wiley InterScience, 2009.
-
(2009)
Security and Communication Networks
-
-
Kotzanikolaou, P.1
Magkos, E.2
Vergados, D.3
Stefanidakis, M.4
-
24
-
-
51749122997
-
Hybrid key establishment for multiphase self-organized sensor networks
-
IEEE Press
-
P. Kotzanikolaou, E. Magkos, C. Douligeris, V. Chrissikopoulos, "Hybrid key establishment for multiphase self-organized sensor networks," in Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks WoWMoM'05, IEEE Press, 2005; 581-587.
-
(2005)
Proceedings of the IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks WoWMoM'05
, pp. 581-587
-
-
Kotzanikolaou, P.1
Magkos, E.2
Douligeris, C.3
Chrissikopoulos, V.4
-
25
-
-
84946228384
-
An asymmetric key establishment protocol for multiphase selforganized sensor networks
-
E. Magkos, P. Kotzanikolaou, M. Stefanidakis, D. Vergados, "An asymmetric key establishment protocol for multiphase selforganized sensor networks," in Proceedings of the 12th European Wireless Conference (EW'06), March 2006.
-
Proceedings of the 12th European Wireless Conference (EW'06), March 2006
-
-
Magkos, E.1
Kotzanikolaou, P.2
Stefanidakis, M.3
Vergados, D.4
-
26
-
-
51749099404
-
Exploiting heterogeneity for sensor network security
-
J. Mache, C.-Y. Wan, and M. Yarvis, "Exploiting heterogeneity for sensor network security," in Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008, pp. 591-593.
-
Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008
, pp. 591-593
-
-
Mache, J.1
Wan, C.-Y.2
Yarvis, M.3
-
27
-
-
56949106654
-
A unified security framework with three key management schemes for wireless sensor networks
-
R. Riaz, A. Naureen, A. Akram, A. Akbar, K. Kim, and H. Farooq Ahmed, "A unified security framework with three key management schemes for wireless sensor networks," Computer Communications, vol. 31, no. 18, pp. 4269-4280, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4269-4280
-
-
Riaz, R.1
Naureen, A.2
Akram, A.3
Akbar, A.4
Kim, K.5
Farooq Ahmed, H.6
-
28
-
-
0002474948
-
Performance comparison of public-key cryptosystems
-
M. J. Wiener, "Performance comparison of public-key cryptosystems,"RSA Laboratories'CryptoBytes, vol. 4, no. 1, pp. 1+3-5, 1998.
-
(1998)
RSA Laboratories'CryptoBytes
, vol.4
, Issue.1
-
-
Wiener, M.J.1
-
30
-
-
84947431932
-
Better than BiBa: Short one-time signatures with fast signing and verifying
-
Proceedings of the 7th Australian Conference on Information Security and Privacy, ser. J. Seberry, Ed., Springer
-
L. Reyzin and N. Reyzin, "Better than BiBa: Short one-time signatures with fast signing and verifying," in Proceedings of the 7th Australian Conference on Information Security and Privacy, ser. Lecture Notes in Computer Science, J. Seberry, Ed., vol. 2384. Springer, 2002, pp. 144-153.
-
(2002)
Lecture Notes in Computer Science
, vol.2384
, pp. 144-153
-
-
Reyzin, L.1
Reyzin, N.2
|