-
1
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
Aziz, A. and Diffie, W. (1994) 'Privacy and authentication for wireless local area networks', IEEE Personal Communications Magazine, Vol. 1, No. 1, pp.25-31.
-
(1994)
IEEE Personal Communications Magazine
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
2
-
-
84876375076
-
Low-cost elliptic curve cryptography for wireless sensor networks
-
Batina, L., Mentens, N., Sakiyama, K., Preneel, B. and Verbauwhede, I. (2006) 'Low-cost elliptic curve cryptography for wireless sensor networks', Springer Journal of Security and Privacy in Ad-Hoc and Sensor Networks, pp.6-17.
-
(2006)
Springer Journal of Security and Privacy in Ad-Hoc and Sensor Networks
, pp. 6-17
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneel, B.4
Verbauwhede, I.5
-
3
-
-
34250787561
-
Realizing robust user authentication in sensor networks
-
20-21 June, Stockholm, Sweden
-
Benenson, Z., Gedicke, N. and Raivio, O. (2005) 'Realizing robust user authentication in sensor networks', Proceedings of Workshop on Real-World Wireless Sensor Networks, 20-21 June, Stockholm, Sweden.
-
(2005)
Proceedings of Workshop on Real-World Wireless Sensor Networks
-
-
Benenson, Z.1
Gedicke, N.2
Raivio, O.3
-
5
-
-
79957925553
-
Advanced two tier user authentication scheme for heterogeneous wireless sensor networks
-
9-12 January, Las Vegas, Nevada, USA
-
Butun, I. and Sankar, R. (2011) 'Advanced two tier user authentication scheme for heterogeneous wireless sensor networks', Proceedings of the Consumer Communications and Networking Conference (CCNC), 9-12 January, Las Vegas, Nevada, USA, pp.169-171.
-
(2011)
Proceedings of the Consumer Communications and Networking Conference (CCNC)
, pp. 169-171
-
-
Butun, I.1
Sankar, R.2
-
6
-
-
84860678464
-
Evaluation of advanced two tier user authentication scheme
-
14-17 January, Las Vegas, Nevada, USA
-
Butun, I., Wang, Y. and Sankar, R. (2012) 'Evaluation of advanced two tier user authentication scheme', Proceedings of the Consumer Communications and Networking Conference (CCNC), 14-17 January, Las Vegas, Nevada, USA, pp.159-163.
-
(2012)
Proceedings of the Consumer Communications and Networking Conference (CCNC)
, pp. 159-163
-
-
Butun, I.1
Wang, Y.2
Sankar, R.3
-
7
-
-
35448965082
-
Two tier secure routing protocol for heterogeneous sensor networks
-
DOI 10.1109/TWC.2007.06095
-
Du, X., Mohsen, G., Yang, X.O. and Hsiao-Hwa, C. (2007) 'Two tier secure routing protocol for heterogeneous sensor networks', IEEE Transactions on Wireless Communications, Vol. 6, No. 9, pp.3395-3401. (Pubitemid 47625218)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3395-3401
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
-
8
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
DOI 10.1109/PERCOMW.2005.76, 1392819, Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
-
Gaubatz, G., Kaps, J.P., Ozturk, E. and Sunar, B. (2005a) 'State of the art in ultra-low power public key cryptography for wireless sensor networks', Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications, 8-12 March, Kauai Island, Hawaii, pp.146-150. (Pubitemid 43762837)
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
, vol.2005
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.-P.2
Ozturk, E.3
Sunar, B.4
-
9
-
-
31844450265
-
Public key cryptography in sensor networks-revisited
-
6 August, Heidelberg, Germany
-
Gaubatz, G., Kaps, J.P. and Sunar, B. (2004) 'Public key cryptography in sensor networks-revisited', Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 6 August, Heidelberg, Germany.
-
(2004)
Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004)
-
-
Gaubatz, G.1
Kaps, J.P.2
Sunar, B.3
-
10
-
-
23944459661
-
Public key cryptography in sensor networks-revisited
-
Security in Ad-hoc and Sensor Networks - First European Workshop, ESAS 2004
-
Gaubatz, G., Kaps, J.P. and Sunar, B. (2005b) 'Public key cryptography in sensor networks-revisited', Springer Journal of Security in Ad-hoc and Sensor Networks, Vol. 3313, pp.2-18. (Pubitemid 41190913)
-
(2005)
Lecture Notes in Computer Science
, vol.3313
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
11
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Gura, N., Patel, A., Wander, A., Eberle, H. and Shantz, S.C. (2004) 'Comparing elliptic curve cryptography and RSA on 8-bit CPUs', Springer Journal of Cryptographic Hardware and Embedded Systems, pp.925-943.
-
(2004)
Springer Journal of Cryptographic Hardware and Embedded Systems
, pp. 925-943
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
12
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
Karlof, C., Naveen, S. and David, W. (2004) 'TinySec: a link layer security architecture for wireless sensor networks', Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys), 3-5 November, Baltimore, MD, USA, pp.162-175. (Pubitemid 41563357)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
13
-
-
84868242584
-
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
-
Le, X.H., Lee, S., Butun, I., Khalid, M. and Sankar, R. (2009a) 'An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography', Journal of Communications and Networks, Vol. 5, No. 3, pp.240-247.
-
(2009)
Journal of Communications and Networks
, vol.5
, Issue.3
, pp. 240-247
-
-
Le, X.H.1
Lee, S.2
Butun, I.3
Khalid, M.4
Sankar, R.5
-
15
-
-
34548764971
-
Implementation of tinyhash based on hash algorithm for sensor network
-
Saint Louis, Mo, USA
-
Lee, H., Choi, Y. and Kim, H. (2005) 'Implementation of tinyhash based on hash algorithm for sensor network', Proceedings of the World Academy of Science, Engineering and Technology, Saint Louis, Mo, USA, pp.135-139.
-
(2005)
Proceedings of the World Academy of Science, Engineering and Technology
, pp. 135-139
-
-
Lee, H.1
Choi, Y.2
Kim, H.3
-
16
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004
-
Malan, D.J., Welsh, M. and Smith, M.D. (2004) 'A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography', Proceedings of 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 4-7 October, pp.71-80. (Pubitemid 40789266)
-
(2004)
2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
17
-
-
34748850632
-
Implementation of elliptic-curve cryptography on mobile healthcare devices
-
DOI 10.1109/ICNSC.2007.372784, 4238997, 2007 IEEE International Conference on Networking, Sensing and Control, ICNSC'07
-
Malhotra, K., Gardner, S. and Patz, R. (2007) 'Implementation of elliptic curve cryptography on mobile healthcare devices', Proceedings of the IEEE International Conference on Networking, Sensing and Control, 15-17 April, London, UK, pp.239-244. (Pubitemid 47468796)
-
(2007)
2007 IEEE International Conference on Networking, Sensing and Control, ICNSC'07
, pp. 239-244
-
-
Malhotra, K.1
Gardner, S.2
Patz, R.3
-
18
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
DOI 10.1145/1180345.1180366, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
Piotrowski, K., Langendoerfer, P. and Peter, S. (2006) 'How public key cryptography influences wireless sensor node lifetime', Proceedings of the 4th ACM workshop on Security of Ad Hoc and Sensor Networks, 30 October, Alexandria, VA, USA, pp.169-176. (Pubitemid 47168568)
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 169-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
19
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
Potlapally, N.R., Ravi, S., Raghunathan, A. and Jha, N.K. (2006) 'A study of the energy consumption characteristics of cryptographic algorithms and security protocols', IEEE Transactions on Mobile Computing, Vol. 5, No. 2, pp.128-143. (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
20
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
25-27 August, Seoul, Korea
-
Potlapally, N.R., Ravi, S., Raghunathan, A. and Jha, N.K. (2003) 'Analyzing the energy consumption of security protocols', Proceedings of the International Symposium on Low Power Electronics and Design, 25-27 August, Seoul, Korea, pp.30-35.
-
(2003)
Proceedings of the International Symposium on Low Power Electronics and Design
, pp. 30-35
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
21
-
-
84855203308
-
Computational and energy costs of cryptographic algorithms on handheld devices
-
Rifa-Pous, H. and Herrera-Joancomarti, J. (2011) 'Computational and energy costs of cryptographic algorithms on handheld devices', Journal of Future Internet, Vol. 3, No. 1, pp.31-48.
-
(2011)
Journal of Future Internet
, vol.3
, Issue.1
, pp. 31-48
-
-
Rifa-Pous, H.1
Herrera-Joancomarti, J.2
-
22
-
-
24644519780
-
Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol
-
2004 1st International Conference on Electrical and Electronics Engineering, ICEEE
-
Rodriguez-Henriquez, F., Lopez-Peza, C.E., Leon-Chavez, M.A. and Puebla, P. (2004) 'Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol', Proceedings of the 1st International Conference on Electrical and Electronics Engineering, 24-27 June, pp.124-129. (Pubitemid 41284114)
-
(2004)
2004 1st International Conference on Electrical and Electronics Engineering, ICEEE
, pp. 124-129
-
-
Rodriguez-Henriquez, F.1
Lopez-Peza, C.E.2
Leon-Chavez, M.A.3
-
23
-
-
52949115365
-
Analyzing energy and time overhead of security mechanisms in wireless sensor networks
-
25-28 June, Bratislava
-
Trakadas, P., Zahariadis, T., Leligou, H.C., Voliotis, S. and Papadopoulos, K. (2008) 'Analyzing energy and time overhead of security mechanisms in wireless sensor networks', Proceedings of IEEE 15th International Conference on Systems, Signals and Image Processing, 25-28 June, Bratislava, pp.137-140.
-
(2008)
Proceedings of IEEE 15th International Conference on Systems, Signals and Image Processing
, pp. 137-140
-
-
Trakadas, P.1
Zahariadis, T.2
Leligou, H.C.3
Voliotis, S.4
Papadopoulos, K.5
-
24
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
DOI 10.1109/GLOCOM.2007.190, 4411100, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
Tseng, H.R., Jan, R.H. and Yang, W. (2007) 'An improved dynamic user authentication scheme for wireless sensor networks', Proceedings of IEEE Global Communications Conference, (GLOBECOM), 26-30 November, Washington, DC, USA, pp.986-990. (Pubitemid 351259178)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 986-990
-
-
Tseng, H.-R.1
Jan, R.-H.2
Yang, W.3
-
25
-
-
51849154205
-
Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control
-
17-20 June, Beijing
-
Wang, H., Sheng, B., Tan, C.C. and Li, Q. (2008) 'Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control', Proceedings of the 28th International Conference on Distributed Computing Systems, ICDCS'08, 17-20 June, Beijing, pp.11-18.
-
(2008)
Proceedings of the 28th International Conference on Distributed Computing Systems, ICDCS'08
, pp. 11-18
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
-
26
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
Wander, A.S., Gura, N., Eberle, H., Gupta, V. and Shantz, S.C. (2005) 'Energy analysis of public-key cryptography for wireless sensor networks', Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications, 8-12 March, pp.324-328. (Pubitemid 43727945)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
27
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
5-7 June, Taichung
-
Wong, K.H.M., Zheng, Y., Cao, J. and Wang, S. (2006) 'A dynamic user authentication scheme for wireless sensor networks', Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 5-7 June, Taichung.
-
(2006)
Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
28
-
-
4143054544
-
Runtime security composition for sensor networks
-
Xue, Q. and Ganz, A. (2003) 'Runtime security composition for sensor networks', Proceedings of the IEEE Vehicular Technology Conference, 6-9 October, Vol. 5, pp.2976-2980.
-
(2003)
Proceedings of the IEEE Vehicular Technology Conference, 6-9 October
, vol.5
, pp. 2976-2980
-
-
Xue, Q.1
Ganz, A.2
|