-
1
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K.H.M. Wong, Y. Zheng, J. Cao, and S. Wang. "A dynamic user authentication scheme for wireless sensor networks." IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006.
-
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
2
-
-
39349093196
-
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
-
H.R. Tseng, R.H. Jan, and W. Yang. "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks." IEEE Global Communications Conference, (GLOBECOM 2007), USA, November 2007, pp. 986-990.
-
IEEE Global Communications Conference, (GLOBECOM 2007), USA, November 2007
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
4
-
-
84860659091
-
Two-Tier User Authentication Scheme for Heterogeneous Sensor Networks
-
X.H. Le, S. Lee, and Y.K. Lee. "Two-Tier User Authentication Scheme for Heterogeneous Sensor Networks." the 5th IEEE International Conference on Distributed Computing in Sensor Systems, (DCOSS '09), Marina Del Rey, California, USA, June 8-10, 2009.
-
5th IEEE International Conference on Distributed Computing in Sensor Systems, (DCOSS '09), Marina del Rey, California, USA, June 8-10, 2009
-
-
Le, X.H.1
Lee, S.2
Lee, Y.K.3
-
6
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A.S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz. "Energy analysis of public-key cryptography for wireless sensor networks." in Proc. of the Third IEEE International Conference on Pervasive Computing and Communications, 2005, pp. 324-328.
-
Proc. of the Third IEEE International Conference on Pervasive Computing and Communications, 2005
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
7
-
-
84860695396
-
-
available at
-
Crossbow MICA2 Mote - Data Sheet, available at: http://www.xbow.com/ products/Product pdf files/Wireless pdf/MICA2 Datasheet.pdf
-
Crossbow MICA2 Mote - Data Sheet
-
-
-
8
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
ACM New York, NY, USA
-
N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, "Analyzing the energy consumption of security protocols." in Proceedings of the 2003 international symposium on Low power electronics and design, ACM New York, NY, USA, 2003, pp. 30-35.
-
(2003)
Proceedings of the 2003 International Symposium on Low Power Electronics and Design
, pp. 30-35
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
12
-
-
35448965082
-
Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks
-
September
-
X. Du, G. Mohsen, X.O. Yang, C. Hsiao-Hwa. "Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks." IEEE Transactions on Wireless Communications, Vol.6 (9), September 2007, pp. 3395-3401.
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3395-3401
-
-
Du, X.1
Mohsen, G.2
Yang, X.O.3
Hsiao-Hwa, C.4
-
15
-
-
34548764971
-
Implementation of TinyHash based on Hash Algorithm for Sensor Network
-
December
-
H. Lee, Y. Choi, H. Kim, "Implementation of TinyHash based on Hash Algorithm for Sensor Network." Proceedings of World Academy of Science, Engineering and Technology, vol.10, December 2005.
-
(2005)
Proceedings of World Academy of Science, Engineering and Technology
, vol.10
-
-
Lee, H.1
Choi, Y.2
Kim, H.3
-
16
-
-
24644519780
-
Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol
-
F. Rodríguez-Henríquez, C.E. López-Peza, M.A. León-Chávez, P. Puebla, "Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol", in 1st International Conference on Electrical and Electronics Engineering, pages 124-129, 2004.
-
(2004)
1st International Conference on Electrical and Electronics Engineering
, pp. 124-129
-
-
Rodríguez-Henríquez, F.1
López-Peza, C.E.2
León-Chávez, M.A.3
Puebla, P.4
|