-
1
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties
-
P. Barreto, S. Galbraith, C.Ó. hÉigeartaigh, and M. Scott Efficient pairing computation on supersingular abelian varieties Designs, Codes and Cryptography 42 2007 239 271
-
(2007)
Designs, Codes and Cryptography
, vol.42
, pp. 239-271
-
-
Barreto, P.1
Galbraith, S.2
Héigeartaigh, C.Ó.3
Scott, M.4
-
3
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
LNCS
-
M. Bellare, C. Namprempre, and G. Neven Security proofs for identity-based identification and signature schemes Advances in Cryptology-Eurocrypt 2004 vol. 3027 2004 LNCS 268 286
-
(2004)
Advances in Cryptology-Eurocrypt 2004
, vol.3027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
LNCS
-
D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing Advances in Cryptology-Crypto 2001 vol. 2139 2001 LNCS 213 229
-
(2001)
Advances in Cryptology-Crypto 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
LNCS
-
D. Boneh, C. Gentry, and B. Waters Collusion resistant broadcast encryption with short ciphertexts and private keys Advances in Cryptology-Crypto 2005 vol. 3621 2005 LNCS 258 275
-
(2005)
Advances in Cryptology-Crypto 2005
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
8
-
-
77953972500
-
An integrated system for secure code distribution in wireless sensor networks
-
N. Bui, O. Ugus, M. Dissegna, M. Rossi, M. Zorzi, An integrated system for secure code distribution in wireless sensor networks, in: Percom'10, 2010, pp. 575-581.
-
(2010)
Percom'10
, pp. 575-581
-
-
Bui, N.1
Ugus, O.2
Dissegna, M.3
Rossi, M.4
Zorzi, M.5
-
9
-
-
77956089601
-
Factoring a 512-bit RSA modulus
-
LNCS
-
S. Cavallar, B. Dodson, A.K. Lenstra, P. Leyland, P.L. Montgomery, B. Murphy, H. te Riele, and P. Zimmermann Factoring a 512-bit RSA modulus Advances in Cryptology-Eurocrypt 2000 vol. 1807 2000 LNCS 1 18
-
(2000)
Advances in Cryptology-Eurocrypt 2000
, vol.1807
, pp. 1-18
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.K.3
Leyland, P.4
Montgomery, P.L.5
Murphy, B.6
Te Riele, H.7
Zimmermann, P.8
-
10
-
-
78349233534
-
Distributed collaborative control for industrial automation with wireless sensor and actuator networks
-
J. Chen, X. Cao, P. Cheng, Y. Xiao, and Y. Sun Distributed collaborative control for industrial automation with wireless sensor and actuator networks IEEE Transactions on Industrial Electronics 57 12 2010 4219 4230
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.12
, pp. 4219-4230
-
-
Chen, J.1
Cao, X.2
Cheng, P.3
Xiao, Y.4
Sun, Y.5
-
11
-
-
84887369121
-
-
mailto:
-
Crossbow, MICAz datasheet. < http://bullseye.xbow.com:81/Products/ Product-pdf-files/Wireless-pdf/MICAz-Datasheet.pdf >.
-
Crossbow, MICAz Datasheet
-
-
-
12
-
-
34247376029
-
Securing the deluge network programming system
-
P.K. Dutta, J.W. Hui, D.C. Chu, D.E. Culler, Securing the deluge network programming system, in: IPSN'06 2006, pp. 326-333.
-
(2006)
IPSN'06
, pp. 326-333
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
13
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal A public-key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory 31 1985 469 472
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
14
-
-
84901205129
-
-
Geoss
-
Geoss. < http://www.epa.gov/geoss/ >.
-
-
-
-
15
-
-
70349619163
-
Industrial wireless sensor networks: Challenges, design principles, and technical approaches
-
V.C. Gungor, and G.P. Hancke Industrial wireless sensor networks: challenges, design principles, and technical approaches IEEE Transactions on Industrial Electronics 56 10 2009 4258 4265
-
(2009)
IEEE Transactions on Industrial Electronics
, vol.56
, Issue.10
, pp. 4258-4265
-
-
Gungor, V.C.1
Hancke, G.P.2
-
18
-
-
84861445209
-
SDRP: A secure and efficient reprogramming protocol for wireless sensor networks
-
D. He, C. Chen, S. Chan, and J. Bu SDRP: a secure and efficient reprogramming protocol for wireless sensor networks IEEE Transactions on Industrial Electronics 59 11 2012 4155 4163
-
(2012)
IEEE Transactions on Industrial Electronics
, vol.59
, Issue.11
, pp. 4155-4163
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
19
-
-
84879121354
-
Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks
-
D. He, C. Chen, S. Chan, and J. Bu Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks IEEE Transactions on Industrial Electronics 60 11 2013 5348 5354
-
(2013)
IEEE Transactions on Industrial Electronics
, vol.60
, Issue.11
, pp. 5348-5354
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
20
-
-
84861438303
-
DiCode: Dos-resistant and distributed code dissemination in wireless sensor networks
-
D. He, C. Chen, S. Chan, and J. Bu DiCode: Dos-resistant and distributed code dissemination in wireless sensor networks IEEE Transacrions on Wireless Communications 11 5 2012 1946 1956
-
(2012)
IEEE Transacrions on Wireless Communications
, vol.11
, Issue.5
, pp. 1946-1956
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
21
-
-
51249093755
-
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
-
S. Hyun, P. Ning, A. Liu, W. Du, Seluge: secure and dos-resistant code dissemination in wireless sensor networks, in: IPSN'08, 2008, pp. 445-456.
-
(2008)
IPSN'08
, pp. 445-456
-
-
Hyun, S.1
Ning, P.2
Liu, A.3
Du, W.4
-
23
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
LNCS
-
A. Joux A one round protocol for tripartite Diffie-Hellman Proc. Fourth Algorithmic Number Theory Symposium vol. 1838 2000 LNCS 385 394
-
(2000)
Proc. Fourth Algorithmic Number Theory Symposium
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
25
-
-
77956987902
-
Factorization of a 76 8-bit RSA modulus
-
LNCS
-
T. Kleinjung, K. Aoki, J. Franke, A.K. Lenstra, E. Thome, J.W. Bos, P. Gaudry, A. Kruppa, P.L. Montgomery, D.A. Osvik, H. te Riele, A. Timofeev, and P. Zimmermann Factorization of a 76 8-bit RSA modulus Advances in Cryptology-Crypto 2010 vol. 6223 2010 LNCS 333 350
-
(2010)
Advances in Cryptology-Crypto 2010
, vol.6223
, pp. 333-350
-
-
Kleinjung, T.1
Aoki, K.2
Franke, J.3
Lenstra, A.K.4
Thome, E.5
Bos, J.W.6
Gaudry, P.7
Kruppa, A.8
Montgomery, P.L.9
Osvik, D.A.10
Te Riele, H.11
Timofeev, A.12
Zimmermann, P.13
-
26
-
-
78249233570
-
Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks
-
Y. Law, Y. Zhang, J. Jin, M. Palaniswami, and P. Havinga Secure rateless deluge: pollution-resistant reprogramming and data dissemination for wireless sensor networks EURASIP Journal on Wireless Communications and Networking 2011 1 21
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, pp. 1-21
-
-
Law, Y.1
Zhang, Y.2
Jin, J.3
Palaniswami, M.4
Havinga, P.5
-
27
-
-
0003291192
-
The development of the number field sieve
-
August
-
A.K. Lenstra, H.W. Lenstra, The development of the number field sieve, in: LNM, vol. 1554, August 1993.
-
(1993)
LNM
, vol.1554
-
-
Lenstra, A.K.1
Lenstra, H.W.2
-
28
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu P. Ning, TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IPSN'08, 2008, pp. 245-256.
-
(2008)
IPSN'08
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
29
-
-
84857009260
-
Mobile sensor node deployment and asynchronous power management for wireless sensor networks
-
R.C. Luo, and O. Chen Mobile sensor node deployment and asynchronous power management for wireless sensor networks IEEE Transactions on Industrial Electronics 59 5 2012 2377 2385
-
(2012)
IEEE Transactions on Industrial Electronics
, vol.59
, Issue.5
, pp. 2377-2385
-
-
Luo, R.C.1
Chen, O.2
-
30
-
-
0019292439
-
Protocols for public key cryptosystems
-
R. Merkle Protocols for public key cryptosystems IEEE Security & Privacy 1980 122 134
-
(1980)
IEEE Security & Privacy
, pp. 122-134
-
-
Merkle, R.1
-
31
-
-
79955656646
-
Programming wireless sensor networks: Fundamental concepts and state of the art
-
L. Mottola, and G. Picco Programming wireless sensor networks: fundamental concepts and state of the art ACM Computing Surveys 43 3 2011 1 51
-
(2011)
ACM Computing Surveys
, vol.43
, Issue.3
, pp. 1-51
-
-
Mottola, L.1
Picco, G.2
-
32
-
-
84901205130
-
-
NOPP
-
NOPP. < http://www.nopp.org/ >.
-
-
-
-
33
-
-
78751642743
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
L.B. Oliveira, D.F. Aranha, C.P. L Gouvea, M. Scott, Danilo F. Câmara, J. Lopez, and R. Dahab TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks Computer Communications 34 2011 485 493
-
(2011)
Computer Communications
, vol.34
, pp. 485-493
-
-
Oliveira, L.B.1
Aranha, D.F.2
Gouvea C P, L.3
Scott, M.4
Câmara, D.F.5
Lopez, J.6
Dahab, R.7
-
34
-
-
46749097974
-
TinyTate: Computing the tate pairing in resource-constrained nodes
-
L.B. Oliveira, D.F. Aranha, E. Morais, F. Daguano, J. Lopez, R. Dahab, TinyTate: computing the tate pairing in resource-constrained nodes, in: Sixth IEEE International Symposium on Network Computing and Applications (NCA07), 2007, pp. 318-323.
-
(2007)
Sixth IEEE International Symposium on Network Computing and Applications (NCA07)
, pp. 318-323
-
-
Oliveira, L.B.1
Aranha, D.F.2
Morais, E.3
Daguano, F.4
Lopez, J.5
Dahab, R.6
-
35
-
-
84859306176
-
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
-
L.B. Oliveira, A. Kansal, B. Priyantha, M. Goraczko, and F. Zhao Secure-TWS: authenticating node to multi-user communication in shared sensor networks The Computer Journal 55 4 2012 384 396
-
(2012)
The Computer Journal
, vol.55
, Issue.4
, pp. 384-396
-
-
Oliveira, L.B.1
Kansal, A.2
Priyantha, B.3
Goraczko, M.4
Zhao, F.5
-
36
-
-
70450273270
-
A protocol for secure and energy-aware reprogramming in WSN
-
C. Parra, J. Garcia-Macias, A protocol for secure and energy-aware reprogramming in WSN, in: IWCMC'09, 2009, pp. 292-297.
-
(2009)
IWCMC'09
, pp. 292-297
-
-
Parra, C.1
Garcia-Macias, J.2
-
37
-
-
84871584567
-
-
<, now on for instance http://en.wikipedia.org/wiki/RSA-numbers >
-
The RSA Challenge Numbers. < http://www.rsa.com/rsalabs/node.asp?id= 2093, now on for instance http://en.wikipedia.org/wiki/RSA-numbers >.
-
The RSA Challenge Numbers
-
-
-
38
-
-
1642378913
-
Cryptosystems based on pairings
-
R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairings, in: Symposium on Cryptography and Information Security, Japan, 2000.
-
(2000)
Symposium on Cryptography and Information Security, Japan
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
39
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
LNCS
-
C.P. Schnorr Efficient identification and signatures for smart cards Advances in Cryptology-Crypto'89 vol. 435 1990 LNCS 239 252
-
(1990)
Advances in Cryptology-Crypto'89
, vol.435
, pp. 239-252
-
-
Schnorr, C.P.1
-
40
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS
-
A. Shamir Identity-based cryptosystems and signature schemes Advances in Cryptology: Crypto'84 vol. 196 1984 LNCS 47 53
-
(1984)
Advances in Cryptology: Crypto'84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
43
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
LNCS
-
P. Szczechowiak, L. Oliveira, M. Scott, M. Collier, and R. Dahab NanoECC: testing the limits of elliptic curve cryptography in sensor networks Wireless Sensor Networks vol. 4913 2008 LNCS 305 320
-
(2008)
Wireless Sensor Networks
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
44
-
-
84879075682
-
Secure multihop network programming with multiple one-way key chains
-
H. Tan, J. Zic, S. Jha, and D. Ostry Secure multihop network programming with multiple one-way key chains IEEE Transaction on Mobile Computing 10 1 2011 16 31
-
(2011)
IEEE Transaction on Mobile Computing
, vol.10
, Issue.1
, pp. 16-31
-
-
Tan, H.1
Zic, J.2
Jha, S.3
Ostry, D.4
-
45
-
-
42149136406
-
-
TmoteSky datasheet. < http://www.eecs.harvard.edu/konrad/projects/ shimmer/references/tmote-sky-datasheet.pdf >.
-
TmoteSky Datasheet
-
-
|