-
1
-
-
84874335737
-
-
MIT AUTO-ID labs Accessed 02.04.2012
-
"MIT AUTO-ID labs," Accessed 02.04.2012. [Online]. Available: http://autoid.mit.edu/cs/
-
-
-
-
2
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
3
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
4
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks," in Proceedings of the 2nd international conference on Embedded networked sensor systems. ACM, 2004, pp. 162-175.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. ACM
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
6
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Symposium on Security and Privacy Proceedings. IEEE, 2003, pp. 197-213.
-
(2003)
Symposium on Security and Privacy Proceedings. IEEE
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit cpus
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit cpus," Cryptographic Hardware and Embedded Systems-CHES 2004, pp. 925-943, 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES 2004
, pp. 925-943
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
9
-
-
84857706133
-
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction
-
J. Bos, M. Kaihara, T. Kleinjung, A. Lenstra, and P. Montgomery, "Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction," International Journal of Applied Cryptography, vol. 2, no. 3, pp. 212-228, 2012.
-
(2012)
International Journal of Applied Cryptography
, vol.2
, Issue.3
, pp. 212-228
-
-
Bos, J.1
Kaihara, M.2
Kleinjung, T.3
Lenstra, A.4
Montgomery, P.5
-
10
-
-
37149040069
-
Enabling full-size public-key algorithms on 8-bit sensor nodes
-
L. Uhsadel, A. Poschmann, and C. Paar, "Enabling full-size public-key algorithms on 8-bit sensor nodes," Security and Privacy in Ad-hoc and Sensor Networks, pp. 73-86, 2007.
-
(2007)
Security and Privacy in Ad-hoc and Sensor Networks
, pp. 73-86
-
-
Uhsadel, L.1
Poschmann, A.2
Paar, C.3
-
12
-
-
79959274315
-
-
2004, Accessed 04.04.2012
-
T. Denis, "Libtomcrypt," 2004, Accessed 04.04.2012. [Online]. Available: http://libtom.org
-
Libtomcrypt
-
-
Denis, T.1
-
14
-
-
71049170328
-
Poster abstract: The scatterweb msb-430 platform for wireless sensor networks
-
M. Baar, E. Köppe, A. Liers, and J. Schiller, "Poster abstract: The scatterweb msb-430 platform for wireless sensor networks," in Contiki Workshop, 2007.
-
(2007)
Contiki Workshop
-
-
Baar, M.1
Köppe, E.2
Liers, A.3
Schiller, J.4
-
15
-
-
84922840264
-
COOJA/MSPSim: Interoperability testing for wireless sensor networks
-
J. Eriksson, F. Osterlind, N. Finne, N. Tsiftes, A. Dunkels, T. Voigt, R. Sauter, and P. Marrón, "COOJA/MSPSim: interoperability testing for wireless sensor networks," in Proceedings of the 2nd International Conference on Simulation Tools and Techniques. ICST, 2009, p. 27.
-
(2009)
Proceedings of the 2nd International Conference on Simulation Tools and Techniques. ICST
, pp. 27
-
-
Eriksson, J.1
Sterlind, F.O.2
Finne, N.3
Tsiftes, N.4
Dunkels, A.5
Voigt, T.6
Sauter, R.7
Marrón, P.8
-
16
-
-
33645091897
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. Chang Shantz, "Sizzle: A standards-based end-to-end security architecture for the embedded internet," Pervasive and Mobile Computing, vol. 1, no. 4, pp. 425-445, 2005.
-
(2005)
Pervasive and Mobile Computing
, vol.1
, Issue.4
, pp. 425-445
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Chang Shantz, S.8
-
17
-
-
84868099857
-
Rfc 6101: The secure sockets layer (SSL) protocol version 3.0
-
A. Freier, P. Karlton, and P. Kocher, "Rfc 6101: The secure sockets layer (SSL) protocol version 3.0," IETF, Tech. Rep., 2011.
-
(2011)
IETF, Tech. Rep.
-
-
Freier, A.1
Karlton, P.2
Kocher, P.3
-
18
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on. IEEE, 2005, pp. 324-328.
-
(2005)
Pervasive Computing and Communications 2005. PerCom 2005. Third IEEE International Conference On. IEEE
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
19
-
-
0010461175
-
Constraints and approaches for distributed sensor network security (final)
-
D. Carman, P. Kruus, and B. Matt, "Constraints and approaches for distributed sensor network security (final)," DARPA Project report, (Cryptographic Technologies Group, NAI Labs), vol. 1, p. 1, 2000.
-
(2000)
DARPA Project Report, (Cryptographic Technologies Group, NAI Labs)
, vol.1
, pp. 1
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
20
-
-
84874303988
-
-
Accessed 04.04.2012
-
E. Laan, "AVRCryptolib," Accessed 04.04.2012. [Online]. Available: http://www.emsign.nl/
-
AVRCryptolib
-
-
Laan, E.1
-
23
-
-
77951121594
-
Wiselib: A generic algorithm library for heterogeneous sensor networks
-
T. Baumgartner, I. Chatzigiannakis, S. Fekete, C. Koninis, A. Kröller, and A. Pyrgelis, "Wiselib: A generic algorithm library for heterogeneous sensor networks," Wireless Sensor Networks, pp. 162-177, 2010.
-
(2010)
Wireless Sensor Networks
, pp. 162-177
-
-
Baumgartner, T.1
Chatzigiannakis, I.2
Fekete, S.3
Koninis, C.4
Kröller, A.5
Pyrgelis, A.6
-
24
-
-
33744909363
-
Avrora: Scalable sensor network simulation with precise timing
-
B. Titzer, D. Lee, and J. Palsberg, "Avrora: Scalable sensor network simulation with precise timing," in Fourth International Symposium on Information Processing in Sensor Networks, IPSN. IEEE, 2005, pp. 477-482.
-
(2005)
Fourth International Symposium on Information Processing in Sensor Networks, IPSN. IEEE
, pp. 477-482
-
-
Titzer, B.1
Lee, D.2
Palsberg, J.3
-
27
-
-
70350579484
-
-
preprint, available online at
-
A. Kargl, S. Pyka, and H. Seuschek, "Fast arithmetic on ATmega128 for elliptic curve cryptography," preprint, available online at http://eprint. iacr. org/2008/442, 2008.
-
(2008)
Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
-
-
Kargl, A.1
Pyka, S.2
Seuschek, H.3
-
28
-
-
77953034949
-
Efficient implementation of elliptic curve cryptography in wireless sensors
-
D. Aranha, R. Dahab, J. López, and L. Oliveira, "Efficient implementation of elliptic curve cryptography in wireless sensors," Advances in Mathematics of Communications, vol. 4, no. 2, pp. 169-187, 2010.
-
(2010)
Advances in Mathematics of Communications
, vol.4
, Issue.2
, pp. 169-187
-
-
Aranha, D.1
Dahab, R.2
López, J.3
Oliveira, L.4
-
29
-
-
84874320140
-
Protocol requirements for internet media guides
-
March
-
Z. Shelby, K. Hartke, C. Bormann, and D. Sturek, "Protocol requirements for internet media guides," IETF, Internet Draft, March 2012.
-
(2012)
IETF, Internet Draft
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
Sturek, D.4
-
30
-
-
84874334581
-
-
October 2010, status: PROPOSED STANDARD
-
H. Schulzrinne, S. Casner, R. Frederic, and V. Jacobson, "RFC 5988: Web linking," October 2010, status: PROPOSED STANDARD.
-
RFC 5988: Web Linking
-
-
Schulzrinne, H.1
Casner, S.2
Frederic, R.3
Jacobson, V.4
-
32
-
-
84874312480
-
CoRE resource directory
-
November
-
Z. Shelby and K. S., "CoRE resource directory," IETF, Internet Draft, November 2011.
-
(2011)
IETF, Internet Draft
-
-
Shelby, Z.1
-
34
-
-
84874315417
-
JSON web signature (JWS)
-
November
-
J. Bradley, N. Sakimura, and M. Jones, "JSON web signature (JWS)," IETF, Internet Draft, November 2011.
-
(2011)
IETF, Internet Draft
-
-
Bradley, J.1
Sakimura, N.2
Jones, M.3
-
37
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Springer
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," in Security Protocols. Springer, 2000, pp. 172-182.
-
(2000)
Security Protocols
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.2
-
41
-
-
84874293153
-
Media types for sensor markup language (SENML)
-
January
-
C. Jennings, J. Arkko, and Z. Shelby, "Media types for sensor markup language (SENML)," IETF, Internet Draft, January 2012.
-
(2012)
IETF, Internet Draft
-
-
Jennings, C.1
Arkko, J.2
Shelby, Z.3
|