-
1
-
-
78049497469
-
Enhancing network availability by tolerance control in multi-sink wireless sensor networks
-
Huang C, Cheng R-H, Chen S-R, Li C-I (2010) Enhancing network availability by tolerance control in multi-sink wireless sensor networks. J Convergence Sect A-3 1(1):15-22
-
(2010)
Journal of Convergence, Section A-3
, vol.1
, Issue.1
, pp. 15-22
-
-
Huang, C.1
Cheng, R.-H.2
Chen, S.-R.3
Li, C.-I.4
-
2
-
-
84856665180
-
Intrusion Detection based on Traffic Analysis and Fuzzy Inference System in Wireless Sensor Networks
-
Ponomarchuk Y, Seo D-W (2010) Intrusion Detection based on Traffic Analysis and Fuzzy Inference System in Wireless Sensor Networks. J Convergence Sect B-1 1(1):35-42
-
(2010)
J Convergence Sect B-1
, vol.1
, Issue.1
, pp. 35-42
-
-
Ponomarchuk, Y.1
Seo, D.-W.2
-
3
-
-
84255212842
-
Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks
-
10.1504/IJITCC.2011.039281
-
Kumar Dilip, Aseri Trilok C, Patel RB (2011) Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks. Int J Inform Technol Commun Convergence 1(2):130-145
-
(2011)
Int J Inform Technol Commun Convergence
, vol.1
, Issue.2
, pp. 130-145
-
-
Kumar, D.1
Aseri Trilok, C.2
Patel, R.B.3
-
4
-
-
84875527298
-
Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks
-
10.1504/IJITCC.2011.042127
-
Zhao Gang, Kumar Anup (2011) Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks. Int J Inform Technol Commun Convergence 1(3):297-317
-
(2011)
Int J Inform Technol Commun Convergence
, vol.1
, Issue.3
, pp. 297-317
-
-
Zhao, G.1
Kumar, A.2
-
5
-
-
0036688074
-
A survey on sensor networks
-
10.1109/MCOM.2002.1024422
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102-114
-
(2002)
IEEE Commun Mag
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
6
-
-
4243082091
-
Security in wireless sensor networks
-
10.1145/990680.990707
-
Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53-57
-
(2004)
Commun ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
8
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
ACM
-
Karlof C, Sastry N, Wagner D (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of ACM SenSys 04, ACM, pp 162-175
-
(2004)
Proceedings of ACM SenSys 04
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
9
-
-
85028913061
-
On-line/off-line digital signatures
-
Lecture Notes in Computer Science, Springer
-
Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO89, volume 2442 of Lecture Notes in Computer Science, Springer, pp 263-277
-
(1989)
Proceedings of CRYPTO89
, vol.2442
, pp. 263-277
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
10
-
-
84880883264
-
Improved online/offline signature schemes
-
Lecture Notes in Computer Science, Springer
-
Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO01, volume 2139 of Lecture Notes in Computer Science, Springer, pp 355-367
-
(2001)
Proceedings of CRYPTO01
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
11
-
-
33745858270
-
New online/offline signature schemes without random oracles
-
Lecture Notes in Computer Science, Springer
-
Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC06, volume 3958 of Lecture Notes in Computer Science, Springer, pp 330-346
-
(2006)
Proceedings of PKC06
, vol.3958
, pp. 330-346
-
-
Kurosawa, K.1
Schmidt-Samoa, K.2
-
12
-
-
58449103589
-
An efficient on-line/off-line signature scheme without random oracles
-
Lecture Notes in Computer Science, Springer
-
Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS08, volume 5339 of Lecture Notes in Computer Science, Springer, pp 98-107
-
(2008)
Proceedings of CANS08
, vol.5339
, pp. 98-107
-
-
Joye, M.1
-
13
-
-
38049075273
-
Efficient generic online/offline signatures without key exposure
-
Lecture Notes in Computer Science, Springer
-
Chen X, Zhang F, Susilo W, Mu Y (2007) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS07, volume 4521 of Lecture Notes in Computer Science, Springer, pp 18-30
-
(2007)
Proceedings of ACNS07
, vol.4521
, pp. 18-30
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Mu, Y.4
-
14
-
-
38149009170
-
Short signatures without random oracles the SDH assumption in bilinear groups
-
2386625 10.1007/s00145-007-9005-7
-
Boneh D, Boyen X (2008) Short signatures without random oracles the SDH assumption in bilinear groups. J Cryptol 2:149-177
-
(2008)
J Cryptol
, vol.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
15
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Lecture Notes in Computer Science, Springer
-
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, Springer, p 47C53
-
(1984)
Proceedings of CRYPTO 84
, vol.196
-
-
Shamir, A.1
-
16
-
-
33746327817
-
Online/offline signatures and multisignatures for AVOD and DSR routing security
-
Lecture Notes in Computer Science, Springer
-
Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP 06, volume 4058 of Lecture Notes in Computer Science, Springer, p 99C110
-
(2006)
Proceedings of ACISP 06
, vol.4058
-
-
Xu, S.1
Mu, Y.2
Susilo, W.3
-
17
-
-
78650166385
-
Efficient online/offline identity-based signature for wireless sensor network
-
Report 2010/003
-
Liu JK, Baek J, Zhou J, Yang Y, Wong JW (2010) Efficient online/offline identity-based signature for wireless sensor network. Cryptology ePrint Archive, Report 2010/003 http://eprint.iacr.org
-
(2010)
Cryptology EPrint Archive
-
-
Liu, J.K.1
Baek, J.2
Zhou, J.3
Yang, Y.4
Wong, J.W.5
-
18
-
-
58449112167
-
On the security of online/offline signatures and multisignatures from acisp06
-
Lecture Notes in Computer Science, Springer
-
Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp06. In: Proceedings of CANS 08, volume 5339 of Lecture Notes in Computer Science, Springer, pp 108-119
-
(2008)
Proceedings of CANS 08
, vol.5339
, pp. 108-119
-
-
Li, F.1
Shirase, M.2
Takagi, T.3
-
19
-
-
70350337335
-
Short and stateless signatures from the RSA assumption
-
LNCS
-
Hohenberger S, Waters B (2009) Short and stateless signatures from the RSA assumption. In: CRYPTO '09, volume 5677 of LNCS, pp 654-670
-
(2009)
CRYPTO '09
, vol.5677
, pp. 654-670
-
-
Hohenberger, S.1
Waters, B.2
-
20
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2)
-
(1988)
SIAM J Comput
, vol.17
, Issue.2
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
22
-
-
23044435711
-
Short signatures from the Weil pairing
-
2090559 1070.94010 10.1007/s00145-004-0314-9
-
Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Cryptol 17(4):297-319
-
(2004)
J Cryptol
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
|