-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug.
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks," IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Comm. Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
-
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," Proc. First Int'l Conf. Embedded Networked Sensor Systems, pp. 255-265, 2003. (Pubitemid 40682351)
-
(2003)
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
4
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Comm. ACM, vol. 47, no. 6, pp. 53-57, June 2004.
-
(2004)
Comm. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
6
-
-
32644435647
-
Energy-efficient secure pattern based data aggregation for wireless sensor networks
-
DOI 10.1016/j.comcom.2004.12.029, PII S0140366405000411
-
H. Cam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, and H.O. Sanli, "Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks," Computer Comm., vol. 29, no. 4, pp. 446-455, 2006. (Pubitemid 43243228)
-
(2006)
Computer Communications
, vol.29
, Issue.4
, pp. 446-455
-
-
Cam, H.1
Ozdemir, S.2
Nair, P.3
Muthuavinashiappan, D.4
Ozgur Sanli, H.5
-
7
-
-
17144429336
-
SRDA: Secure reference-based data aggregation protocol for wireless sensor networks
-
H. Sanli, S. Ozdemir, and H. Cam, "SRDA: Secure Reference-based Data Aggregation Protocol for Wireless Sensor Networks," Proc. IEEE 60th Vehicular Technology Conf. (VTC '04-Fall), vol. 7, 2004.
-
(2004)
Proc. IEEE 60th Vehicular Technology Conf. (VTC '04-Fall)
, vol.7
-
-
Sanli, H.1
Ozdemir, S.2
Cam, H.3
-
8
-
-
17144411499
-
Classify encrypted data in wireless sensor networks
-
2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security
-
Y. Wu, D. Ma, T. Li, and R.H. Deng, "Classify Encrypted Data in Wireless Sensor Networks," Proc. IEEE 60th Vehicular Technology Conf., pp. 3236-3239, 2004. (Pubitemid 40513096)
-
(2004)
IEEE Vehicular Technology Conference
, vol.60
, Issue.5
, pp. 3236-3239
-
-
Wu, Y.1
Ma, D.2
Li, T.3
Deng, R.H.4
-
9
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
DOI 10.1109/TMC.2006.144, 1683790
-
D. Westhoff, J. Girao, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006. (Pubitemid 44335247)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
10
-
-
24144459865
-
CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
-
J. Girao, D. Westhoff, M. Schneider, N. Ltd, and G. Heidelberg, "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. (ICC '05), vol. 5, 2005.
-
(2005)
Proc. IEEE Int'l Conf. Comm. (ICC '05)
, vol.5
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
Ltd, N.4
Heidelberg, G.5
-
11
-
-
42549159545
-
Public key based cryptoschemes for data concealment in wireless sensor networks
-
E. Mykletun, J. Girao, and D. Westhoff, "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. (ICC '06), vol. 5, 2006.
-
(2006)
Proc. IEEE Int'l Conf. Comm. (ICC '06)
, vol.5
-
-
Mykletun, E.1
Girao, J.2
Westhoff, D.3
-
12
-
-
34249316910
-
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.004, PII S1570870506000321
-
J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks," Ad Hoc Networks, vol. 5, no. 7, pp. 1073-1089, 2007. (Pubitemid 46819205)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.7
, pp. 1073-1089
-
-
Girao, J.1
Westhoff, D.2
Mykletun, E.3
Araki, T.4
-
13
-
-
24144433396
-
Evaluating 2-dnf formulas on ciphertexts
-
D. Boneh, E. Goh, and K. Nissim, "Evaluating 2-DNF Formulas on Ciphertexts," Proc. Second Int'l Conf. Theory of Cryptography (TCC), vol. 3378, pp. 325-341, 2005.
-
(2005)
Proc. Second Int'l Conf. Theory of Cryptography (TCC)
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
14
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
DOI 10.1109/MOBIQUITOUS.2005.25, 1540992, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '05), pp. 109-117, 2005. (Pubitemid 44523269)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
15
-
-
76949090588
-
A survey on the encryption of convergecast-traffic with in-network processing
-
Jan.-Mar.
-
S. Peter, D. Westhoff, and C. Castelluccia, "A Survey on the Encryption of Convergecast-Traffic with In-Network Processing," IEEE Trans. Dependable and Secure Computing, vol. 7, no. 1, pp. 20-34, Jan.-Mar. 2010.
-
(2010)
IEEE Trans. Dependable and Secure Computing
, vol.7
, Issue.1
, pp. 20-34
-
-
Peter, S.1
Westhoff, D.2
Castelluccia, C.3
-
16
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
-
Advances in Cryptology - CRYPTO '98
-
R. Cramer and V. Shoup, "A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack," Proc. 18th Ann. Int'l Cryptology Conf. Advances in Cryptology, pp. 13-25, 1998. (Pubitemid 128118994)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
17
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
J. Domingo-Ferrer, "A Provably Secure Additive and Multiplicative Privacy Homomorphism," Proc. Fifth Int'l Conf. Information Security, pp. 471-483, 2002.
-
(2002)
Proc. Fifth Int'l Conf. Information Security
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
18
-
-
0348003132
-
The state of elliptic curve cryptography
-
N. Koblitz, A. Menezes, and S. Vanstone, "The State of Elliptic Curve Cryptography," Designs, Codes and Cryptography, vol. 19, no. 2, pp. 173-193, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
21
-
-
46749097974
-
TinyTate: Computing the tate pairing in resource-constrained sensor nodes
-
L. Oliveira, D. Aranha, E. Morais, F. Daguano, J. Lopez, and R. Dahab, "TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes," Proc. IEEE Sixth Int'l Symp. Network Computing and Applications (NCA '07), pp. 318-323, 2007.
-
(2007)
Proc. IEEE Sixth Int'l Symp. Network Computing and Applications (NCA '07)
, pp. 318-323
-
-
Oliveira, L.1
Aranha, D.2
Morais, E.3
Daguano, F.4
Lopez, J.5
Dahab, R.6
-
23
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
DOI 10.1145/1218556.1218559
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, 2006. (Pubitemid 46278640)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
24
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
25
-
-
77953848025
-
Multi-application deployment in shared sensor networks based on quality of monitoring
-
S. Bhattacharya, A. Saifullah, C. Lu, and G. Roman, "Multi- Application Deployment in Shared Sensor Networks Based on Quality of Monitoring," Proc. IEEE 16th Real-Time and Embedded Technology and Applications Symp., pp. 259-268, 2010.
-
(2010)
Proc. IEEE 16th Real-Time and Embedded Technology and Applications Symp.
, pp. 259-268
-
-
Bhattacharya, S.1
Saifullah, A.2
Lu, C.3
Roman, G.4
-
26
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz, "Comparing Elliptic Curve Cryptography and Rsa on 8-bit CPUs," Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 119-132, 2004.
-
(2004)
Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
27
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
DOI 10.1109/PERCOMW.2005.76, 1392819, Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
-
G. Gaubatz, J. Kaps, E. Ozturk, and B. Sunar, "State of the Art in Ultra-Low Power Public Key Cryptography For Wireless Sensor Networks," Proc. IEEE Third Int'l Conf. Pervasive Computing and Comm. Workshops, pp. 146-150, 2005. (Pubitemid 43762837)
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
, vol.2005
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.-P.2
Ozturk, E.3
Sunar, B.4
-
28
-
-
39749088678
-
Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks
-
K. McCusker, N. O'Connor, and D. Diamond, "Low-Energy Finite Field Arithmetic Primitives for Implementing Security in Wireless Sensor Networks," Proc. Int'l Conf. Comm., Circuits and Systems, vol. 3, 2006.
-
(2006)
Proc. Int'l Conf. Comm., Circuits and Systems
, vol.3
-
-
McCusker, K.1
O'Connor, N.2
Diamond, D.3
-
33
-
-
79551598148
-
Finding composite order ordinary elliptic curves using the cocks-pinch method
-
D. Boneh, K. Rubin, and A. Silverberg, "Finding Composite Order Ordinary Elliptic Curves Using the Cocks-Pinch Method," J. Number Theory, vol. 131, pp. 832-841, 2011.
-
(2011)
J. Number Theory
, vol.131
, pp. 832-841
-
-
Boneh, D.1
Rubin, K.2
Silverberg, A.3
-
35
-
-
29144433598
-
Cryptanalysis of an algebraic privacy homomorph-ism
-
D. Wagner, "Cryptanalysis of an Algebraic Privacy Homomorph-ism," Proc. Sixth Information Security Conf., pp. 234-239, 2003.
-
(2003)
Proc. Sixth Information Security Conf.
, pp. 234-239
-
-
Wagner, D.1
-
38
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
G. De Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira, "On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm., pp. 580-585, 2008.
-
(2008)
Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm.
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
39
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
B. Iyer, C. Li, and S. Mehrotra, "Executing Sql over Encrypted Data in the Database-Service-Provider Model," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 216-227, 2002. (Pubitemid 34985549)
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
|