-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Çayirci, E.: Wireless sensor networks: A survey. Computer Networks 38(4), 393-422 (2002)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Çayirci, E.4
-
4
-
-
53449083656
-
-
Crossbow Technology, Inc, January
-
Crossbow Technology, Inc.: MICA2DOT Wireless Microsensor Mote. Data sheet (January 2006), http://www.xbow.com/Products/Product pdf files/Wireless pdf/MICA2DOT Datasheet.pdf
-
(2006)
MICA2DOT Wireless Microsensor Mote. Data sheet
-
-
-
6
-
-
79957797091
-
Faster point multiplication on elliptic curves with efficient endomorphisms
-
Springer, Heidelberg, In: Kilian, J. (ed.)
-
Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 190-200. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 190-200
-
-
Gallant, R.P.1
Lambert, R.J.2
Vanstone, S.A.3
-
8
-
-
47749100816
-
Performance evaluation of instruction set extensions for long integer modular arithmetic on a SPARC V8 processor
-
IEEE Computer Society Press, Los Alamitos
-
Großschädl, J., Tillich, S., Szekely, A.: Performance evaluation of instruction set extensions for long integer modular arithmetic on a SPARC V8 processor. In: Proceedings of the 10th Euromicro Conference on Digital System Design (DSD 2007), pp. 680-689. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
Proceedings of the 10th Euromicro Conference on Digital System Design (DSD 2007)
, pp. 680-689
-
-
Großschädl, J.1
Tillich, S.2
Szekely, A.3
-
9
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Springer, Heidelberg, In: Joye, M., Quisquater, J.J. (eds.)
-
Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
(2004)
CHES 2004. LNCS
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.S.3
Eberle, H.4
Chang Shantz, S.5
-
10
-
-
11244267013
-
-
Springer, Heidelberg
-
Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.R.1
Menezes, A.J.2
Vanstone, S.A.3
-
11
-
-
22544448109
-
A reusable Duff device
-
Holly, R.: A reusable Duff device. Dr. Dobb's Journal 30(8), 73-74 (2005)
-
(2005)
Dr. Dobb's Journal
, vol.30
, Issue.8
, pp. 73-74
-
-
Holly, R.1
-
12
-
-
3042594839
-
The security and privacy of smart vehicles
-
Hubaux, J.P., Ĉapkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security & Privacy 2(3), 49-55 (2004)
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.P.1
Ĉapkun, S.2
Luo, J.3
-
13
-
-
33845566496
-
Design of 5.9 GHz DSRC-based vehicular safety communication
-
Jiang, D., Taliwal, V., Meier, A., Holfelder, W., Herrtwich, R.G.: Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications 13(5), 36-43 (2006)
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 36-43
-
-
Jiang, D.1
Taliwal, V.2
Meier, A.3
Holfelder, W.4
Herrtwich, R.G.5
-
14
-
-
0030172012
-
Analyzing and comparing Montgomery multiplication algorithms
-
Koç, Ç.K., Acar, T., Kaliski, B.S.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro 16(3), 26-33 (1996)
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 26-33
-
-
Koç, C.K.1
Acar, T.2
Kaliski, B.S.3
-
15
-
-
33749643165
-
Threats to security in DSRC/WAVE
-
Springer, Heidelberg, In: Kunz, T., Ravi, S.S. (eds.)
-
Laurendeau, C., Barbeau, M.: Threats to security in DSRC/WAVE. In: Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. LNCS, vol. 4104, pp. 266-279. Springer, Heidelberg (2006)
-
(2006)
ADHOC-NOW 2006. LNCS
, vol.4104
, pp. 266-279
-
-
Laurendeau, C.1
Barbeau, M.2
-
16
-
-
70350585044
-
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
-
Springer, Heidelberg, In: Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C.J., Quisquater, J.J. (eds.)
-
Lederer, C., Mader, R., Koschuch, M., Großschädl, J., Szekely, A., Tillich, S.: Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In: Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C.J., Quisquater, J.J. (eds.) WISTP 2009. LNCS, vol. 5746, pp. 112-127. Springer, Heidelberg (2009)
-
(2009)
WISTP 2009. LNCS
, vol.5746
, pp. 112-127
-
-
Lederer, C.1
Mader, R.2
Koschuch, M.3
Großschädl, J.4
Szekely, A.5
Tillich, S.6
-
19
-
-
33745948310
-
The security of vehicular ad hoc networks
-
In: Atluri, V., Ning, P., Du, W. (eds.), ACM Press, New York
-
Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: Atluri, V., Ning, P., Du, W. (eds.) Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), pp. 11-21. ACM Press, New York (2005)
-
(2005)
Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005)
, pp. 11-21
-
-
Raya, M.1
Hubaux, J.P.2
-
20
-
-
0012584245
-
-
Tech. Rep. CORR-99-39, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada
-
Solinas, J.A.: Generalized Mersenne numbers. Tech. Rep. CORR-99-39, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada (1999)
-
(1999)
Generalized Mersenne numbers
-
-
Solinas, J.A.1
-
21
-
-
84884991648
-
-
Standards for Efficient Cryptography Group (SECG): SEC 1, version 1.7 November
-
Standards for Efficient Cryptography Group (SECG): SEC 1: Elliptic Curve Cryptography. Working draft, version 1.7 (November 2006), http://www.secg.org/download/aid-631/sec1_1point7.pdf
-
(2006)
Elliptic Curve Cryptography. Working draft
-
-
-
22
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
Springer, Heidelberg, In: Verdone, R. (ed.)
-
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
-
(2008)
EWSN 2008. LNCS
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
23
-
-
70350617038
-
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
-
In: Wolf, T., Parameswaran, S. (eds.)
-
Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11-16 (2007), http://arxiv.org/abs/0903.3900
-
(2007)
Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007)
, pp. 11-16
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.A.5
-
25
-
-
85008955601
-
Efficient implementation of public key cryptosystems on mote sensors
-
Springer, Heidelberg, In: Ning, P., Qing, S., Li, N. (eds.)
-
Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519-528. Springer, Heidelberg (2006)
-
(2006)
ICICS 2006. LNCS
, vol.4307
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
-
26
-
-
0035121216
-
Smart dust: Communicating with a cubic-millimeter computer
-
Warneke, B., Last, M., Liebowitz, B., Pister, K.S.: Smart dust: Communicating with a cubic-millimeter computer. Computer 34(1), 44-51 (2001)
-
(2001)
Computer
, vol.34
, Issue.1
, pp. 44-51
-
-
Warneke, B.1
Last, M.2
Liebowitz, B.3
Pister, K.S.4
|