-
1
-
-
84861166810
-
Public Verifiable Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem
-
DOI: 10.1007/978-3-642-29166-1-12
-
Ch., S.A., Nizamuddin, Sher, M,. Public Verifiable Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem, Communications in Computer and Information Science, 2012, Volume 285, pp. 135-142, DOI: 10.1007/978-3-642-29166-1-12.
-
(2012)
Communications in Computer and Information Science
, vol.285
, pp. 135-142
-
-
Nizamuddin, Ch.S.A.1
Sher, M.2
-
2
-
-
84857485578
-
Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem
-
DOI: 10.1109/HONET.2011.6149826
-
Nizamuddin, Ch., S.A., Amin, N., Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem, HONET 2011, Riyadh, Kingdom of Saudi Arabia December 19-21, 2011, DOI: 10.1109/HONET.2011.6149826
-
HONET 2011, Riyadh, Kingdom of Saudi Arabia December 19-21, 2011
-
-
Nizamuddin, Ch.S.A.1
Amin, N.2
-
3
-
-
80755159505
-
Efficient Signcryption Schemes based on Hyperelliptic Curve Cryptosystem
-
DOI:10.1109/ICET.2011.6048467
-
Nizamuddin, Ch., S.A., Nasar, W., Javaid, Q., Efficient Signcryption Schemes based on Hyperelliptic Curve Cryptosystem, IEEE International Conference on Emerging Technologies 2011 (ICET 2011), Islamabad, Pakistan, September 5-6, 2011 DOI:10.1109/ICET.2011.6048467
-
IEEE International Conference on Emerging Technologies 2011 (ICET 2011), Islamabad, Pakistan, September 5-6, 2011
-
-
Nizamuddin, Ch.S.A.1
Nasar, W.2
Javaid, Q.3
-
5
-
-
84863110431
-
An Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks Based on Hybrid Cryptosystem
-
IEEE, China, 11-14 April
-
Amin, N., Asad, M. Nizamuddin , Ch., S.A., An Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks Based on Hybrid Cryptosystem, IEEE, ICNSC 2012 , China, 11-14 April, 2012
-
(2012)
ICNSC 2012
-
-
Amin, N.1
Asad, M.2
Nizamuddin, Ch.S.A.3
-
6
-
-
0842304771
-
The resurrecting duckling-What next?
-
Christianson, B., Crispo, B., Roe, M., Eds.; Spriger: Berlin, Germany
-
Stajano, F., The resurrecting duckling-What next?, In Proceedings of the 8th International Workshop on Security Protocols, Cambridge, UK, 3-5 April 2000; Christianson, B., Crispo, B., Roe, M., Eds.; Spriger: Berlin, Germany, 2000.
-
(2000)
Proceedings of the 8th International Workshop on Security Protocols, Cambridge, UK, 3-5 April 2000
-
-
Stajano, F.1
-
7
-
-
35248853846
-
An efficient scheme for user authentication in wireless sensor networks
-
Jiang, C., Li, B., Xu, H., An efficient scheme for user authentication in wireless sensor networks, In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, Canada, 21-23 May 2007.
-
Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, Canada, 21-23 May 2007
-
-
Jiang, C.1
Li, B.2
Xu, H.3
-
8
-
-
56749181478
-
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
-
Conti, M., Pietro, R. D., Mancini, L.V., Mei, A., Emergent properties: detection of the node-capture attack in mobile wireless sensor networks In WiSec 2008.
-
WiSec 2008
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
9
-
-
77957605947
-
A Key Agreement Algorithm with Rekeying for Wireless Sensor Networks using Public Key Cryptography
-
Eldefrawy, M.H., Khan, M. K., Alghathbar, K., A Key Agreement Algorithm with Rekeying for Wireless Sensor Networks using Public Key Cryptography, International Conference on Anti-Counterfeiting Security and Identification in Communication (ASID), 2010.
-
International Conference on Anti-Counterfeiting Security and Identification in Communication (ASID), 2010
-
-
Eldefrawy, M.H.1
Khan, M.K.2
Alghathbar, K.3
-
10
-
-
79960911554
-
Implementation of RSA Security Protocol for Sensor Network Security: Design and Network Lifetime Analysis
-
Sahanaa ,A., Misrab, I.S., Implementation of RSA Security Protocol for Sensor Network Security: Design and Network Lifetime Analysis". 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology (Wireless VITAE), 2011
-
2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology (Wireless VITAE), 2011
-
-
Sahanaa, A.1
Misrab, I.S.2
-
11
-
-
29844450868
-
-
CHES, August
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz,S., Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, CHES, August 2004.
-
(2004)
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
12
-
-
70350464378
-
Using trust for key distribution and route selection in wireless sensor networks
-
Nov.
-
N. Lewis, N. Foukia, "Using trust for key distribution and route selection in wireless sensor networks," IEEE Globecom, pp.16-30, Nov. 2007.
-
(2007)
IEEE Globecom
, pp. 16-30
-
-
Lewis, N.1
Foukia, N.2
-
13
-
-
79955712919
-
Key Management Systems for Sensor Networks in the Context of the Internet of Things
-
Elsevier Science Press
-
Roman, R., Tello, C.A., Lopez, J., Sklavos, N.,Key Management Systems for Sensor Networks in the Context of the Internet of Things, Computers& Electrical Engineering, Elsevier Science Press, Vol. 37, Numbers 2, pp. 147-159, 2011.
-
(2011)
Computers& Electrical Engineering
, vol.37
, Issue.2
, pp. 147-159
-
-
Roman, R.1
Tello, C.A.2
Lopez, J.3
Sklavos, N.4
-
14
-
-
33750836663
-
A design proposal of security architecture for medical body sensor networks
-
Washington, DC, USA: IEEE Computer Society
-
S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, A design proposal of security architecture for medical body sensor networks, in BSN '06: Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06). Washington, DC, USA: IEEE Computer Society, 2006, pp. 84-90..
-
(2006)
BSN '06: Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06)
, pp. 84-90
-
-
Bao, S.-D.1
Zhang, Y.-T.2
Shen, L.-F.3
|