-
2
-
-
79953784283
-
M2M: From mobile to embedded internet
-
W. Geng, S. Talwar, K. Johnsson, N. Himayat, and K.D. Johnson M2M: from mobile to embedded internet IEEE Commun. Mag. 49 4 2011 36 43
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 36-43
-
-
Geng, W.1
Talwar, S.2
Johnsson, K.3
Himayat, N.4
Johnson, K.D.5
-
3
-
-
84876061754
-
Wireless M2M communication networks for smart grid applications
-
April
-
C. Wietfeld, H. Georg, S. Groening, C. Lewandowski, C. Mueller, J. Schmutzler, Wireless M2M communication networks for smart grid applications, in: Wireless Conference 2011 - Sustainable Wireless Technologies (European Wireless), April 2011.
-
(2011)
Wireless Conference 2011 - Sustainable Wireless Technologies (European Wireless)
-
-
Wietfeld, C.1
Georg, H.2
Groening, S.3
Lewandowski, C.4
Mueller, C.5
Schmutzler, J.6
-
4
-
-
79953778099
-
Home M2M networks: Architectures, standards, and QoS improvement
-
Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani Home M2M networks: architectures, standards, and QoS improvement IEEE Commun. Mag. 49 4 April 2011 44 52
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 44-52
-
-
Zhang, Y.1
Yu, R.2
Xie, S.3
Yao, W.4
Xiao, Y.5
Guizani, M.6
-
8
-
-
33746205145
-
-
IETF RFC 3830, August
-
J. Arkko, E. Carrara, F. Lindholm, M. Naslund, K. Norrman, MIKEY: Multimedia Internet KEYing, IETF RFC 3830, August 2004.
-
(2004)
MIKEY: Multimedia Internet KEYing
-
-
Arkko, J.1
Carrara, E.2
Lindholm, F.3
Naslund, M.4
Norrman, K.5
-
14
-
-
27644517087
-
Key distribution techniques for sensor networks
-
T. Znati, Springer (Chapter 13)
-
H. Chan, A. Perrig, and D. Song Key distribution techniques for sensor networks T. Znati, Wireless Sensor Networks 2004 Springer 277 303 (Chapter 13)
-
(2004)
Wireless Sensor Networks
, pp. 277-303
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
16
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proceedings of IEEE INFOCOM'04. 2004.
-
(2004)
Proceedings of IEEE INFOCOM'04
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
17
-
-
33745963889
-
A security architecture for mobile wireless sensor networks
-
Heidelberg, Germany August
-
S. Schmidt, H. Krahn, S. Fischer, D. Watjen, A security architecture for mobile wireless sensor networks, in: Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS'04) (Heidelberg, Germany), vol. 3313, August 2004.
-
(2004)
Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS'04)
, vol.3313
-
-
Schmidt, S.1
Krahn, H.2
Fischer, S.3
Watjen, D.4
-
18
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Trans. Mobile Comput. 2006 128 143 (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
19
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
V. Gupta, M. Millard, S. Fung, Yu Zhu, N. Gura, H. Eberle, S. Chang Shantz, Sizzle: a standards-based end-to-end security architecture for the embedded internet, in: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, March 08-12, 2005, pp. 247-256. (Pubitemid 43727934)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 247-256
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
23
-
-
80051539057
-
Modified protocols for internet key exchange (IKE) using public encryption key and signature keys
-
V. Nagalakshmi, I. Rameshbabu, P.S. Avadhani, Modified protocols for internet key exchange (IKE) using public encryption key and signature keys, in: Proc. of the Eighth International Conference on Information Technology: New Generations, 2011, pp. 376-381.
-
(2011)
Proc. of the Eighth International Conference on Information Technology: New Generations
, pp. 376-381
-
-
Nagalakshmi, V.1
Rameshbabu, I.2
Avadhani, P.S.3
-
24
-
-
85016055245
-
Establishment of ECC-based initial secrecy usable for IKE implementation
-
R. Sangram, G.P. Biswas, Establishment of ECC-based initial secrecy usable for IKE implementation, in: Lecture Notes in Engineering and Computer, Science, 2012, pp. 530-535.
-
(2012)
Lecture Notes in Engineering and Computer, Science
, pp. 530-535
-
-
Sangram, R.1
Biswas, G.P.2
-
25
-
-
51249109865
-
-
Technical Report TR-2007-36, North Carolina State University, Department of Computer, Science
-
A. Liu, P. Ning, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, Technical Report TR-2007-36, North Carolina State University, Department of Computer, Science, 2007.
-
(2007)
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
-
-
Liu, A.1
Ning, P.2
-
27
-
-
0003455038
-
-
Ph.D. Dissertation, Dept. of Electrical Engineering, Stanford Univ.
-
R. Merkle, Secrecy, Authentication, and Public Key Systems, Ph.D. Dissertation, Dept. of Electrical Engineering, Stanford Univ., 1979.
-
(1979)
Secrecy, Authentication, and Public Key Systems
-
-
Merkle, R.1
-
30
-
-
33746881477
-
Power consumption evaluation of efficient digital signature schemes for low power devices
-
DOI 10.1109/WIMOB.2005.1512820, 1512820, 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
-
S. Seys, B. Preneel, Power consumption evaluation of efficient digital signature schemes for low power devices, in: Proceedings of the 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (IEEE WiMob 2005), 2005, pp. 79-86. (Pubitemid 44183171)
-
(2005)
2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
, vol.1
, pp. 79-86
-
-
Seys, S.1
Preneel, B.2
-
33
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir How to share a secret Commun. ACM 22 1979 612 613 November
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
36
-
-
84896261766
-
-
IT++ Library
-
IT++ Library. < http://itpp.sourceforge.net/current/ >.
-
-
-
-
37
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
A. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: Third IEEE International Conference on Pervasive Computing and Communications, 2005, pp. 324-328. (Pubitemid 43727945)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
38
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
G. De Meulenaer, F. Gosset, F.-X. Standaert, O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, in: Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008), 2008.
-
(2008)
Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008)
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
39
-
-
84866424016
-
-
IEEE Computer Society Washington DC, USA
-
J. Paek, K. Chintalapudi, R. Govindan, J. Caffrey, and S. Masri A Wireless Sensor Network for Structural Health Monitoring: Performance and Experience 2005 IEEE Computer Society Washington DC, USA
-
(2005)
A Wireless Sensor Network for Structural Health Monitoring: Performance and Experience
-
-
Paek, J.1
Chintalapudi, K.2
Govindan, R.3
Caffrey, J.4
Masri, S.5
-
40
-
-
67650686065
-
Duty cycle control for low-power-listening mac protocols
-
C. Merlin, W. Heinzelman, Duty cycle control for low-power-listening mac protocols, in: MASS, 2008.
-
(2008)
MASS
-
-
Merlin, C.1
Heinzelman, W.2
|