-
1
-
-
16644374371
-
Establishing Pair wise Keys in Distributed Sensor Networks
-
Feb
-
Liu, P. Ning, and R. Li, "Establishing Pair wise Keys in Distributed Sensor Networks," ACM Trans. on Information and System Security, vol. 8, no. 1, pp. 41 - 77, Feb 2005.
-
(2005)
ACM Trans. on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu1
Ning, P.2
Li, R.3
-
2
-
-
58049085359
-
The Design of a secure key management system for mobile Ad-hoc networks
-
Quebec, Canada
-
A. Boukerche and Ren Y., "The Design of a secure key management system for mobile Ad-hoc networks," in Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN'08), pp. 320-327, Quebec, Canada, 2008.
-
(2008)
Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN'08)
, pp. 320-327
-
-
Boukerche, A.1
Ren, Y.2
-
3
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
-
C. C. Y. Poon, Y. T. Zhang, and S. D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.T.2
Bao, S.D.3
-
5
-
-
33646948221
-
A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health
-
C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, "A Novel Biometrics Method To Secure Wireless Body Area Sensor Networks for Telemedicine And M-Health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.-T.2
Bao, S.-D.3
-
6
-
-
35248853846
-
An efficient scheme for user authentication in wireless sensor networks
-
C. Jiang, B. Li, H. Xu, "An efficient scheme for user authentication in wireless sensor networks" In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, Canada, 21-23 May 2007.
-
Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, Canada, 21-23 May 2007
-
-
Jiang, C.1
Li, B.2
Xu, H.3
-
10
-
-
27244436587
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
August
-
N. Gura, A. Patel, A. Wander, H. Eberle, S. Chang Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs", CHES, August 2004.
-
(2004)
CHES
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Chang Shantz, S.5
-
11
-
-
70350464378
-
Using trust for key distribution and route selection in wireless sensor networks
-
Nov.
-
N. Lewis, N. Foukia, "Using trust for key distribution and route selection in wireless sensor networks," IEEE Globecom, pp.16-30, Nov. 2007.
-
(2007)
IEEE Globecom
, pp. 16-30
-
-
Lewis, N.1
Foukia, N.2
-
12
-
-
57849115342
-
ACAR: Adaptive connectivity aware routing protocol for vehicular Ad Hoc networks
-
Q. Yang, A. Lim, S. Li, J. Fang, and P. Agrawal, "ACAR: Adaptive connectivity aware routing protocol for vehicular Ad Hoc networks," Proceedings of the 17th IEEE International Conference on Computer Communications and Networks, 2008
-
Proceedings of the 17th IEEE International Conference on Computer Communications and Networks, 2008
-
-
Yang, Q.1
Lim, A.2
Li, S.3
Fang, J.4
Agrawal, P.5
-
13
-
-
56749181478
-
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
-
M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, "Emergent properties: detection of the node-capture attack in mobile wireless sensor networks" In WiSec 2008.
-
WiSec 2008
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
|