-
2
-
-
27644517087
-
Key Distribution Techniques for Sensor Networks
-
T. Znati et al., eds.
-
H. Chan, A. Perrig and D. Song,"Key Distribution Techniques for Sensor Networks," Wireless Sensor Networks, T. Znati et al., eds., 2004.
-
(2004)
Wireless Sensor Networks
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: testing the limits of elliptic curve cryptography in sensor networks," Proceedings of the 7th international Conference on Information Processing in Sensor Networks (IPSN '08), pp. 305-320, 2008.
-
(2008)
Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN '08)
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
5
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruss, "TinyPK: Securing sensor networks with public key technology," in Proceedings of the 2nd ACM workshop
-
Proceedings of the 2nd ACM Workshop
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruss, P.6
-
6
-
-
78049413781
-
SecFleck: A Public Key Technology Platform for Wireless Sensor Networks
-
W. Hu, P. Corke , W. C. Shih, L. Overs, "secFleck: A Public Key Technology Platform for Wireless Sensor Networks," in Proceedings of the 6th European Conference on Wireless Sensor Networks, February 11-13, 2009, Cork, Ireland.
-
Proceedings of the 6th European Conference on Wireless Sensor Networks, February 11-13, 2009, Cork, Ireland
-
-
Hu, W.1
Corke, P.2
Shih, W.C.3
Overs, L.4
-
7
-
-
77951011210
-
Power consumption of hardware cryptography platform for wireless sensor
-
December
-
P. Pecho, J. Nagy, and P. Hanáček, "Power consumption of hardware cryptography platform for wireless sensor," in Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '09), pp. 318-323, December 2009.
-
(2009)
Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '09)
, pp. 318-323
-
-
Pecho, P.1
Nagy, J.2
Hanáček, P.3
-
8
-
-
53149137371
-
Hardware - Software implementation of public-key cryptography for wireless sensor networks
-
June
-
G. Murphy, A. Keeshan, R. Agarwal, and E. Popovici, "Hardware - software implementation of public-key cryptography for wireless sensor networks," in IET Irish Signals and Systems Conference, pp. 463-468, June 2006.
-
(2006)
IET Irish Signals and Systems Conference
, pp. 463-468
-
-
Murphy, G.1
Keeshan, A.2
Agarwal, R.3
Popovici, E.4
-
9
-
-
56949106654
-
A unified security framework with three key management schemes for wireless sensor networks
-
R. Riaz, A. Naureen, A. Akram, A. Akbar, K. Kim, and H. Farooq Ahmed, "A unified security framework with three key management schemes for wireless sensor networks," Computer Communications, vol. 31, no. 18, pp. 4269-4280, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4269-4280
-
-
Riaz, R.1
Naureen, A.2
Akram, A.3
Akbar, A.4
Kim, K.5
Farooq Ahmed, H.6
-
10
-
-
51749099404
-
Exploiting heterogeneity for sensor network security
-
J. Mache, C.-Y. Wan, and M. Yarvis, "Exploiting heterogeneity for sensor network security," in Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008, pp. 591-593.
-
Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008
, pp. 591-593
-
-
Mache, J.1
Wan, C.-Y.2
Yarvis, M.3
-
13
-
-
56749155925
-
Fractal Merkle Tree Representation and Traversal
-
M. Jakobsson, T. Leighton, S. Micali, and M. Szydlo, "Fractal Merkle Tree Representation and Traversal," in RSA Cryptographers Track, 2003.
-
(2003)
RSA Cryptographers Track
-
-
Jakobsson, M.1
Leighton, T.2
Micali, S.3
Szydlo, M.4
-
14
-
-
33846984345
-
-
available at
-
B. Sklar. Reed-solomon codes, available at http://ptgmedia.pearsoncmg. com/images/art-sklar7-reed-solomon/elementLinks/art-sklar7-reed-solomon.pdf
-
Reed-solomon Codes
-
-
Sklar, B.1
-
16
-
-
26444497860
-
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
-
Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
-
A. Armando et al, "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications," in Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, Springer, Heidelberg (2005), http://www.avispa-project.org
-
(2005)
LNCS
, vol.3576
-
-
Armando, A.1
-
18
-
-
84876097386
-
SPAN - A Security Protocol ANimator for AVISPA - User Manual
-
Y. Glouche and T. Genet. "SPAN - a Security Protocol ANimator for AVISPA - User Manual," IRISA / Université de Rennes 1, 2006. 20 pages. http ://www.irisa.fr/lande/genet/span/.
-
(2006)
IRISA / Université de Rennes
, vol.1
, pp. 20
-
-
Glouche, Y.1
Genet, T.2
|