-
1
-
-
34047126869
-
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
-
P. Baronti, P. Pillai, V.W.C. Chook, S. Chessa, A. Gotta, and Y. F. Hu. (2007). Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications, 30(7):1655-1695.
-
(2007)
Computer Communications
, vol.30
, Issue.7
, pp. 1655-1695
-
-
Baronti, P.1
Pillai, P.2
Chook, V.W.C.3
Chessa, S.4
Gotta, A.5
Hu, Y.F.6
-
3
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
Berkeley, California
-
H. Chan, A. Perrig, and D. Song. (2003). Random Key Predistribution Schemes for Sensor Networks. In IEEE Symposium on Security and Privacy, pages 197-213, Berkeley, California.
-
(2003)
In IEEE Symposium On Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
77954920932
-
An efficient dynamic group key agreement protocol for imbalanced wireless networks
-
Y.-H Chuang and Y.-M. Tseng. (2010). An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management, 20(4):167-180.
-
(2010)
International Journal of Network Management
, vol.20
, Issue.4
, pp. 167-180
-
-
Chuang, Y.-H.1
Tseng, Y.-M.2
-
5
-
-
84879484537
-
-
Atmel Corporation. Available from: http://www.atmel.com.
-
Atmel Corporation
-
-
-
6
-
-
84858227508
-
A Survey on Analytic Studies of Key Distribution Mechanisms in Wireless Sensor Networks
-
A. K. Das. (2010). A Survey on Analytic Studies of Key Distribution Mechanisms in Wireless Sensor Networks. Journal of Information Assurance and Security, 5(5):526-553.
-
(2010)
Journal of Information Assurance and Security
, vol.5
, Issue.5
, pp. 526-553
-
-
Das, A.K.1
-
7
-
-
79251556858
-
An Efficient Random Key Distribution Scheme for Large-Scale Distributed Sensor Networks
-
A. K. Das. (2011). An Efficient Random Key Distribution Scheme for Large-Scale Distributed Sensor Networks. Security and Communication Networks, 4(2):162-180.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.2
, pp. 162-180
-
-
Das, A.K.1
-
8
-
-
62949130774
-
Two-Factor User Authentication in Wireless Sensor Networks
-
M. L. Das. (2009). Two-Factor User Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 8(3):1086-1090.
-
(2009)
IEEE Transactions On Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
9
-
-
84955600081
-
n)
-
Springer-verlag
-
n). In Proc. of Advances in Cryptology - ASIACRYPT'96, Lecture Notes in Computer Science, Springer-verlag, volume 1163, pages 65-76.
-
(1996)
In Proc. of Advances In Cryptology - ASIACRYPT'96, Lecture Notes In Computer Science
, vol.1163
, pp. 65-76
-
-
Dewin, E.1
Bosselaers, A.2
Vandenberghe, S.3
de Gersem, P.4
Vandewalle, J.5
-
12
-
-
3042783638
-
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks
-
Washington DC, USA
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. (October 27-31 2003). A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In ACM Conference on Computer and Communications Security (CCS'03), pages 42-51, Washington DC, USA.
-
(2003)
In ACM Conference On Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
13
-
-
43749092801
-
Provably Secure Constant Round Contributory Group Key Agreement
-
R. Dutta and R. Barua. (May 2008). Provably Secure Constant Round Contributory Group Key Agreement. IEEE Transactions on Information Theory, 54(5):2007-2025.
-
(2008)
IEEE Transactions On Information Theory
, vol.54
, Issue.5
, pp. 2007-2025
-
-
Dutta, R.1
Barua, R.2
-
16
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Springer-verlag
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), Lecture Notes in Computer Science, Springer-verlag, volume 3156, pages 119-132.
-
(2004)
In Proceedings of 6th International Workshop On Cryptographic Hardware and Embedded Systems (CHES'04), Lecture Notes In Computer Science
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
17
-
-
55849115257
-
A novel access control protocol for secure sensor networks
-
H.-F. Huang. (2009). A novel access control protocol for secure sensor networks. Computer Standards & Interfaces, 31:272-276.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 272-276
-
-
Huang, H.-F.1
-
18
-
-
79959266313
-
A New Design of Access Control in Wireless Sensor Networks
-
Article ID 412146, doi:10.1155/2011/412146
-
H.-F. Huang. (2011). A New Design of Access Control in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 2011. Article ID 412146, 7 pages doi:10.1155/2011/412146.
-
(2011)
International Journal of Distributed Sensor Networks
, pp. 7
-
-
Huang, H.-F.1
-
20
-
-
68949177260
-
Enhanced novel access control protocol over wireless sensor networks
-
H.-S. Kim and S.-W. Lee. (2009). Enhanced novel access control protocol over wireless sensor networks. IEEE Transactions on Consumer Electronics, 55(2):492-498.
-
(2009)
IEEE Transactions On Consumer Electronics
, vol.55
, Issue.2
, pp. 492-498
-
-
Kim, H.-S.1
Lee, S.-W.2
-
22
-
-
0348003132
-
The state of elliptic curve cryptography
-
N. Koblitz, A. Menezes, and S. A. Vanstone. (2000). The state of elliptic curve cryptography. Designs, Codes and Cryptography, 19(2-3):173-193.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.A.3
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.M. Adleman. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21:120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
27
-
-
84957657892
-
Fast key exchange with elliptic curve systems
-
Springer-verlag
-
R. Schroeppel, H. Orman, S. O'Malley, and O. Spatscheck. (1995). Fast key exchange with elliptic curve systems. In Proc. of Advances in Cryptology-CRYPTO'95, Lecture Notes in Computer Science, Springer-verlag, volume 963, pages 43-56.
-
(1995)
In Proc. of Advances In Cryptology-CRYPTO'95, Lecture Notes In Computer Science
, vol.963
, pp. 43-56
-
-
Schroeppel, R.1
Orman, H.2
O'Malley, S.3
Spatscheck, O.4
-
28
-
-
78149245511
-
COMMENT: Enhanced Novel Access Control Protocol over Wireless Sensor Networks
-
J. Shen, S. Moh, and I. Chung. (2010). COMMENT: "Enhanced Novel Access Control Protocol over Wireless Sensor Networks". IEEE Transactions on Consumer Electronics, 56(3):2019-2021.
-
(2010)
IEEE Transactions On Consumer Electronics
, vol.56
, Issue.3
, pp. 2019-2021
-
-
Shen, J.1
Moh, S.2
Chung, I.3
-
29
-
-
0003629991
-
-
FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce
-
Secure Hash Standard. FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
30
-
-
84894258163
-
-
CC2420: 2.4 GHz IEEE 802.15.4/ZigBee-Ready RF Transceiver, Accessed on September 2011
-
CC2420: 2.4 GHz IEEE 802.15.4/ZigBee-Ready RF Transceiver. Available from: http://www.ti.com/product/cc2420. Accessed on September 2011.
-
-
-
-
31
-
-
84976770858
-
Responses to NIST's proposal
-
S. Vanstone. (1992). Responses to NIST's proposal. Communications of the ACM, 35:50-52.
-
(1992)
Communications of the ACM
, vol.35
, pp. 50-52
-
-
Vanstone, S.1
-
34
-
-
84873031582
-
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
-
doi:10.1007/s10916-011-9700-7
-
S. Wu and K. Chen. (2011). An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System. J Med Syst. doi:10.1007/s10916-011-9700-7.
-
(2011)
J Med Syst
-
-
Wu, S.1
Chen, K.2
-
35
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11-12):2314-2341.
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
36
-
-
46449122114
-
Wireless sensor network survey
-
J. Yick, B. Mukherjee, and D. Ghosal. (2008). Wireless sensor network survey. Computer Networks, 52(12):2292-2330.
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
37
-
-
33750012404
-
Access control in wireless sensor networks
-
Y. Zhou, Y. Zhang, and Y. Fang. (2007). Access control in wireless sensor networks. Ad Hoc Networks, 5:3-13.
-
(2007)
Ad Hoc Networks
, vol.5
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
|