-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
Akyildiz, I. F., W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: A survey. Computer Networks 38, no. 4 (March 2002): 393–422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
57849137451
-
The study of applying sensor networks to a smart home
-
Byoung-Kug, Kim, Hong Sung-Kwa, Jeong Young-Sik, and Eom Doo-Seop. The study of applying sensor networks to a smart home. Fourth International Conference on Networked Computing and Advanced Information Management. IEEE, 2008, 676–681.
-
(2008)
Fourth International Conference on Networked Computing and Advanced Information Management. IEEE
, pp. 676-681
-
-
Kim, B.-K.1
Hong, S.-K.2
Jeong, Y.-S.3
Eom, D.-S.4
-
4
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
Chee-Yee, Chong, and S. P. Kumar. Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE 91, no. 8 (2003): 1247–1256.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chee-Yee, C.1
Kumar, S.P.2
-
5
-
-
78649992846
-
Based on ZigBee wireless sensor network the monitoring system design for chemical production process toxic and harmful gas
-
Chen, Lei, Shuang Yang, and Ying Xi. Based on ZigBee wireless sensor network the monitoring system design for chemical production process toxic and harmful gas. International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE). IEEE, 2010, 425–428.
-
(2010)
International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE). IEEE
, pp. 425-428
-
-
Lei, C.1
Yang, S.2
Xi, Y.3
-
6
-
-
0000792126
-
Distributed multitarget multisensor tracking
-
Y. Bar-Shalom (ed.)
-
Chong, C.Y., S. Mori, and K. C. Chang. Distributed multitarget multisensor tracking. In Y. Bar-Shalom (ed.), Multitarget-Multisensor Tracking: Applications and Advances. Artech House, 1990, 247–295.
-
(1990)
Multitarget-Multisensor Tracking: Applications and Advances. Artech House
, pp. 247-295
-
-
Chong, C.Y.1
Mori, S.2
Chang, K.C.3
-
7
-
-
33947387064
-
SoC issues for RF smart dust
-
Cook, B., S. Lanzisera, and K. Pister. SoC issues for RF smart dust. Proceedings of IEEE (IEEE) 94, no. 6 (2006): 1177–1196.
-
(2006)
Proceedings of IEEE (IEEE)
, vol.94
, Issue.6
, pp. 1177-1196
-
-
Cook, B.1
Lanzisera, S.2
Pister, K.3
-
8
-
-
85039444848
-
Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
IEEE Std. 802.15.4—2003: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE, 2003.
-
(2003)
IEEE
-
-
-
9
-
-
33749523074
-
Wireless sensor networks for health monitoring
-
IEEE
-
Jafari, R., A. Encarnacao, A. Zahoory, F. Dabiri, H. Noshadi, and M. Sarrafzadeh. Wireless sensor networks for health monitoring. Proceedings of 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. IEEE, 2005, 479–481.
-
(2005)
Proceedings of 2Nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
, pp. 479-481
-
-
Jafari, R.1
Encarnacao, A.2
Zahoory, A.3
Dabiri, F.4
Noshadi, H.5
Sarrafzadeh, M.6
-
10
-
-
51849104106
-
Undersea wireless sensor network for ocean pollution prevention. Proceedings of 3rd International Conference on Communication Systems Software and Middleware and Workshops
-
Khan, A., and L. Jenkins. Undersea wireless sensor network for ocean pollution prevention. Proceedings of 3rd International Conference on Communication Systems Software and Middleware and Workshops. IEEE, 2008, 2–8.
-
(2008)
IEEE
, pp. 2-8
-
-
Khan, A.1
Jenkins, L.2
-
11
-
-
77958150562
-
Wireless sensor networks for healthcare
-
October
-
Ko, JeongGil, Chenyang Lu, M. B. Srivastava, J. A. Stankovic, A. Terzis, and M. Welsh. Wireless sensor networks for healthcare. Proceedings of the IEEE (IEEE) 98, no. 11 (October 2010): 1947–1960.
-
(2010)
Proceedings of the IEEE (IEEE)
, vol.98
, Issue.11
, pp. 1947-1960
-
-
Ko, J.1
Chenyang, L.2
Srivastava, M.B.3
Stankovic, J.A.4
Terzis, A.5
Welsh, M.6
-
13
-
-
77954391115
-
Fast and accurate WSN positioning in emergency logistics
-
Lai, Xin, Jun Li, Wei Zhong, and Yuan Cao. Fast and accurate WSN positioning in emergency logistics. Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2010, 277–280.
-
(2010)
Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC). IEEE
, pp. 277-280
-
-
Xin, L.1
Jun, L.2
Wei, Z.3
Yuan, C.4
-
14
-
-
77951428353
-
Wireless sensor network design for tactical military applications: Remote large-scale environments
-
IEEE
-
Lee, Sang Hyuk, Soobin Lee, Heecheol Song, and Hwang Soo Lee. Wireless sensor network design for tactical military applications: Remote large-scale environments. Proceedings of the 28th IEEE Conference on Military Communications. IEEE, 2009, 1–7.
-
(2009)
Proceedings of the 28Th IEEE Conference on Military Communications
, pp. 1-7
-
-
Lee, S.H.1
Lee, S.2
Song, H.3
Lee, H.S.4
-
15
-
-
0021124458
-
Knowledge based speech analysis and enhancement
-
Myers, C., A. Oppenheim, R. Davis, and W. Dove. Knowledge based speech analysis and enhancement. International Conference on Acoustics, Speech and Signal Processing. IEEE, 1984, 162–165.
-
(1984)
International Conference on Acoustics, Speech and Signal Processing. IEEE
, pp. 162-165
-
-
Myers, C.1
Oppenheim, A.2
Davis, R.3
Dove, W.4
-
16
-
-
34548038361
-
Fault-resilient sensing in wireless sensor networks
-
Nakayama, H., N. Ansari, A. Jamalipour, and Y. Nemot. Fault-resilient sensing in wireless sensor networks. Computer Communications 30, no. 11 (2007): 2375–2384.
-
(2007)
Computer Communications
, vol.30
, Issue.11
, pp. 2375-2384
-
-
Nakayama, H.1
Ansari, N.2
Jamalipour, A.3
Nemot, Y.4
-
18
-
-
0000664248
-
The broadcast storm problem in a mobile ad hoc network
-
Ni, S., Y. Tseng, Y. Chen, and J. Sheu. The broadcast storm problem in a mobile ad hoc network. Proceedings of ACM MOBICOM. ACM, 1999, 151–162.
-
(1999)
Proceedings of ACM MOBICOM. ACM
, pp. 151-162
-
-
Ni, S.1
Tseng, Y.2
Chen, Y.3
Sheu, J.4
-
24
-
-
0024612211
-
Mach: A system software kernel. 34th Computer Society International Conference (COMPCON)
-
Rashid, R., et al. Mach: A system software kernel. 34th Computer Society International Conference (COMPCON). IEEE, 1989, 176–178.
-
(1989)
IEEE
, pp. 176-178
-
-
Rashid, R.1
-
26
-
-
3242765057
-
Data mules: Modeling and analysis of a threetier architecture for sparse sensor networks
-
Shah, R., S. Roy, S. Jain, and W. Brunette. Data mules: Modeling and analysis of a threetier architecture for sparse sensor networks. Ad Hoc Networks (Elsevier) 1, no. 2–3 (2003): 215–233.
-
(2003)
Ad Hoc Networks (Elsevier)
, vol.1
, Issue.2-3
, pp. 215-233
-
-
Shah, R.1
Roy, S.2
Jain, S.3
Brunette, W.4
-
29
-
-
27744578667
-
Monitoring volcanic eruptions with a wireless sensor network
-
Werner-Allen, G., J. Johnson, M. Ruiz, J. Lees, and M. Welsh. Monitoring volcanic eruptions with a wireless sensor network. Proceeedings of the Second European Workshop on Wireless Sensor Networks. IEEE, 2005, 108–120.
-
(2005)
Proceeedings of the Second European Workshop on Wireless Sensor Networks. IEEE
, pp. 108-120
-
-
Werner-Allen, G.1
Johnson, J.2
Ruiz, M.3
Lees, J.4
Welsh, M.5
-
30
-
-
84893316353
-
Quantifying eavesdropping vulnerability in sensor networks
-
Anand, M., Z. G. Ives, and I. Lee. Quantifying eavesdropping vulnerability in sensor networks. Departmental papers, Department of Computer & Information Science, University of Pennsylvania, 2005.
-
(2005)
Departmental Papers, Department of Computer & Information Science, University of Pennsylvania
-
-
Anand, M.1
Ives, Z.G.2
Lee, I.3
-
32
-
-
65249128049
-
Security for wireless sensor networks: A review. SAS 2009— IEEE Sensors Applications Symposium
-
Healy, M., T. Newe, and E. Lewis. Security for wireless sensor networks: A review. SAS 2009— IEEE Sensors Applications Symposium. IEEE, 2009, 80–85.
-
(2009)
IEEE
, pp. 80-85
-
-
Healy, M.1
Newe, T.2
Lewis, E.3
-
35
-
-
3042785862
-
The sybil attack in sensor networks
-
Newsome, J., E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis & defenses. Third International Symposium on Information Processing in Sensor Networks, IPSN. IEEE, 2004, 259–268.
-
(2004)
Analysis & Defenses. Third International Symposium on Information Processing in Sensor Networks, IPSN. IEEE
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
36
-
-
0036738266
-
SPINS: Security protocols for sensors
-
Perrig, A., R. Szewczyk, J. Tygar, V. Wen, and D. Culler. SPINS: Security protocols for sensors. Wireless Networks 8, no. 5 (2002): 521–534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
37
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
Perrig, A., J. Stankovic, and D. Wagner. Security in wireless sensor networks. Communications of the ACM 47, no. 6 (June 2004): 53–57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
38
-
-
60749131639
-
The application of TinyOS beaconing WSN routing protocol in mine safety monitoring
-
Sun, Z., X.-G. Zhang, H. Li, and A. Li. The application of TinyOS beaconing WSN routing protocol in mine safety monitoring. International Conference on Mechtronic and Embedded Systems and Applications, MESA. IEEE, 2008, 415–419.
-
(2008)
International Conference on Mechtronic and Embedded Systems and Applications, MESA. IEEE
, pp. 415-419
-
-
Sun, Z.1
Zhang, X.-G.2
Li, H.3
Li, A.4
-
39
-
-
84884094440
-
-
ACM
-
Xu, W., W. Trappe, Y. Zhang, and T Wood. Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ‘05). ACM, 2005, 48-57.
-
(2005)
Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc ‘05
, pp. 48-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
40
-
-
51849119602
-
Defending wireless sensor networks from radio interference through channel adaptation
-
August
-
Xu, W., W. Trappe, and Y. Zhang. Defending wireless sensor networks from radio interference through channel adaptation. ACM Transactions on Sensor Networks, 4, no. 4 (August 2008).
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.4
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
47
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory (IEEE) 31, no. 4 (1984): 469–472.
-
(1984)
IEEE Transactions on Information Theory (IEEE)
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
48
-
-
84946844750
-
A one round protocol for tripartite Diffie–Hellman
-
Springer-Verlag
-
Joux, A. A one round protocol for tripartite Diffie–Hellman. Lecture Notes in Computer Science (Springer-Verlag) 1838 (2000): 385–394.
-
(2000)
Lecture Notes in Computer Science
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
49
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N. Elliptic curve cryptosystems. Mathematics of Computation 48, no. 177 (1987): 203–209.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
50
-
-
0001258323
-
Factoring integers with elliptic curves
-
Lenstra, H. W. Factoring integers with elliptic curves. Annals of Mathematics 126, no. 3 (1987): 649–673.
-
(1987)
Annals of Mathematics
, vol.126
, Issue.3
, pp. 649-673
-
-
Lenstra, H.W.1
-
52
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM (ACM) 21, no. 2 (1978): 120–126.
-
(1978)
Communications of the ACM (ACM)
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
57
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
(Springer-Verlag) 3027
-
Boneh, D., and X. Boyen. Efficient selective-ID secure identity-based encryption without random oracles. Lecture Notes in Computer Science (Springer-Verlag) 3027 (2004): 223–238.
-
(2004)
Lecture Notes in Computer Science
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
59
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Boneh, D., C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. Lecture Notes in Computer Science (Springer-Verlag) 2656 (2003): 416–432.
-
(2003)
Lecture Notes in Computer Science (Springer-Verlag)
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
61
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues. Cryptography and in Coding—Institute of Mathematics and Its Applications International Conference on Cryptography and Coding—Proceedings of IMA 2001
-
Cocks, C. An identity based encryption scheme based on quadratic residues. Cryptography and in Coding—Institute of Mathematics and Its Applications International Conference on Cryptography and Coding—Proceedings of IMA 2001, LNCS (Springer-Verlag) 2260 (2001): 360–363.
-
(2001)
LNCS (Springer-Verlag)
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
63
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Elgamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. Transactions on Information Theory 31, no. 4 (1985): 469–472.
-
(1985)
Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
69
-
-
24744440154
-
Secure key issuing in ID-based cryptography
-
Lee, B., C. Boyd, E. Dawson, K. Kim, and J. Yang. Secure key issuing in ID-based cryptography. Conferences in Research and Practice in Information Technology (2004): 69–74.
-
(2004)
Conferences in Research and Practice in Information Technology
, pp. 69-74
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
-
70
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
-
Maurer, U. M. Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms. Lecture Notes in Computer Science (Springer) 839 (1994): 271–281.
-
(1994)
Lecture Notes in Computer Science (Springer)
, vol.839
, pp. 271-281
-
-
Maurer, U.M.1
-
72
-
-
0017930809
-
A method of obtaining digital signatures and public-key cryptosystems
-
Rivest, R., A. Shamir, and L. Adleman. A method of obtaining digital signatures and public-key cryptosystems. Communications (ACM) 21, no. 2 (1978): 120–126.
-
(1978)
Communications (ACM)
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
74
-
-
85020598353
-
Identity-based cryptosystems and signature schemes. Advances in Cryptology
-
Shamir, A. Identity-based cryptosystems and signature schemes. Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science (Springer-Verlag) 196 (1984): 47–53.
-
(1984)
Proceedings of CRYPTO 84, Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
79
-
-
39049094066
-
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
-
Cao, X., W. Kou, L. Dang, and B. Zhao. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communication (Elsevier) 31 (2008): 659–667.
-
(2008)
Computer Communication (Elsevier)
, vol.31
, pp. 659-667
-
-
Cao, X.1
Kou, W.2
Dang, L.3
Zhao, B.4
-
80
-
-
48049100992
-
Query privacy in wireless sensor networks
-
Carbunar, B., Y. Yu, L. Shi, M. Pearce, and V. Vasudevan. Query privacy in wireless sensor networks. Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, 2007, 203–212.
-
(2007)
Sensor, Mesh and Ad Hoc Communications and Networks. IEEE
, pp. 203-212
-
-
Carbunar, B.1
Yu, Y.2
Shi, L.3
Pearce, M.4
Vasudevan, V.5
-
82
-
-
1542286901
-
Fast Authenticated Key Establishment Protocols for Organizing Sensor Networks
-
Huang, Q., J. Cukier, H. Kobayashi, B. Liu, and J. Zhang. Fast Authenticated Key Establishment Protocols for Organizing Sensor Networks. Workshop on Sensor Networks and Applications (WSNA). ACM, 2003, 141–150.
-
(2003)
Workshop on Sensor Networks and Applications (WSNA). ACM
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
89
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Perrig, A., R. Canetti, J. D. Tygar, and D. Song. Efficient authentication and signing of multicast streams over lossy channels. Symposium on Security and Privacy. IEEE, 2000, 56–73.
-
(2000)
Symposium on Security and Privacy. IEEE
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
90
-
-
0034771605
-
SPINS
-
Perrig, A., R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security protocols for sensor networks. Edited by ACM. Proceedings of MobiCom. Rome, 2001, 189–199.
-
(2001)
Security Protocols for Sensor Networks. Edited by ACM. Proceedings of Mobicom. Rome
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
91
-
-
43549089535
-
Multi-user broadcast authentication in wireless sensor networks
-
IEEE
-
Ren, K., W. Lou, and Y. Zhang. Multi-user broadcast authentication in wireless sensor networks. Proceedings of Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, 2012, 223–232.
-
(2012)
Proceedings of Sensor, Mesh and Ad Hoc Communications and Networks
, pp. 223-232
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
92
-
-
12344258539
-
Efficient signature generation for smart card
-
Schnorr, C. P. Efficient signature generation for smart card. Journal of Crytology 4, no. 3 (1991): 161–174.
-
(1991)
Journal of Crytology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
93
-
-
28244469017
-
Analysis and improvement of an authenticated key exchange protocol for sensor networks
-
Tian, X., D. Wong, and R. Zhu. Analysis and improvement of an authenticated key exchange protocol for sensor networks. Communications Letters (IEEE) 9, no. 11 (2005): 970–972.
-
(2005)
Communications Letters (IEEE)
, vol.9
, Issue.11
, pp. 970-972
-
-
Tian, X.1
Wong, D.2
Zhu, R.3
-
94
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Wander, A. S., N. Gura, H. Eberle, V. Gupta, and S. C. Shantz. Energy analysis of public-key cryptography for wireless sensor networks. Third IEEE International Conference on Pervasive Computing and Communications. IEEE, 2005, 324–328.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications. IEEE
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
95
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
ACM
-
Watro, R., D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. TinyPK: Securing sensor networks with public key technology. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. ACM, 2004, 59–64.
-
(2004)
2Nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
96
-
-
77953034949
-
Efficient implementation of elliptic curve cryptography in wireless sensors
-
Aranha, D., R. Dahab, J. López, and L. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications 4, no. 2 (2010): 169–187.
-
(2010)
Advances in Mathematics of Communications
, vol.4
, Issue.2
, pp. 169-187
-
-
Aranha, D.1
Dahab, R.2
López, J.3
Oliveira, L.4
-
99
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Berlin: Springer-Verlag
-
Blundo, C., A. D. Santis, A. Herzberg, and S. Kutten. Perfectly-secure key distribution for dynamic conferences. Advances in Cryptology-Crypto ‘92 (Berlin: Springer-Verlag), 1992, 471–486.
-
(1992)
Advances in Cryptology-Crypto ‘92
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
-
101
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Camtepe, S., and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE Transactions on Networking (IEEE) 15, no. 2 (2007): 346–358.
-
(2007)
IEEE Transactions on Networking (IEEE)
, vol.15
, Issue.2
, pp. 346-358
-
-
Camtepe, S.1
Yener, B.2
-
102
-
-
0038487088
-
Random key pre-distribution schemes for sensor networks
-
IEEE
-
Chan, H., Perrig, A., and D. Song. Random key pre-distribution schemes for sensor networks. Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE, 2003, 197–213.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
103
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du, W., J. Deng, Y. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003). ACM, 2003, 42–51.
-
(2003)
Proceedings of the 10Th ACM Conference on Computer and Communications Security (CCS 2003). ACM
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
106
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman. Proceedings of Algorithmic Number Theory Symposium – ANTS IV
-
Joux A. A one round protocol for tripartite Diffie-Hellman. Proceedings of Algorithmic Number Theory Symposium – ANTS IV, Lecture Notes in Computer Science (Springer-Verlag) 1838 (2000): 385–394.
-
(2000)
Lecture Notes in Computer Science (Springer-Verlag)
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
107
-
-
24144503356
-
Deterministic key predistribution schemes for distributed sensor networks
-
Lee, J., and D. Stinson. Deterministic key predistribution schemes for distributed sensor networks. Lecture Notes in Computer Science (Springer-Verlag) 3357 (2005): 294–307.
-
(2005)
Lecture Notes in Computer Science (Springer-Verlag)
, vol.3357
, pp. 294-307
-
-
Lee, J.1
Stinson, D.2
-
112
-
-
0036738266
-
SPINS: Security protocols for sensor
-
Perrig, A., R. Szewczyk, J. Tygar, V. Wen, and D. Culler. SPINS: Security protocols for sensor. Wireless Networks 8, no. 5 (2002): 521–534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
115
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
Al-Karaki, J. N., and A. E. Kamal. Routing techniques in wireless sensor networks: A survey. Wireless Communications (IEEE) 11 (2004): 6–28.
-
(2004)
Wireless Communications (IEEE)
, vol.11
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
117
-
-
77953034949
-
Efficient implementation of elliptic curve cryptography in wireless sensors
-
Aranha, D., R. Dahab, J. López, and L. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications 4, no. 2 (2010): 169–187.
-
(2010)
Advances in Mathematics of Communications 4
, vol.2
, pp. 169-187
-
-
Aranha, D.1
Dahab, R.2
López, J.3
Oliveira, L.4
-
120
-
-
35048874134
-
ACE: An emergent algorithm for highly uniform cluster formation
-
Chan, H., and A. Perrig. ACE: An emergent algorithm for highly uniform cluster formation. Lecture Notes in Computer Science (Springer) 2920 (2004): 154–171.
-
(2004)
Lecture Notes in Computer Science (Springer)
, vol.2920
, pp. 154-171
-
-
Chan, H.1
Perrig, A.2
-
121
-
-
0035789268
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
-
Ganesan, D., R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review (ACM SIGMOBILE) 5, no. 4 (2001): 10–24.
-
(2001)
Mobile Computing and Communications Review (ACM SIGMOBILE)
, vol.5
, Issue.4
, pp. 10-24
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
122
-
-
0035415758
-
The performance of query control scheme for the zone routing protocol
-
Haas, Z., and M. Pearlman. The performance of query control scheme for the zone routing protocol. Transactions on Networking (IEEE), 2001, 427–438.
-
(2001)
Transactions on Networking (IEEE)
, pp. 427-438
-
-
Haas, Z.1
Pearlman, M.2
-
123
-
-
33646589837
-
An application specific protocol architecture for wireless microsensor networks
-
Heinzelman, W., A. Chandrakasan, and H. Balakrishnan. An application specific protocol architecture for wireless microsensor networks. Transactions on Wireless Communications (IEEE) 1, no. 4 (2002): 660–670.
-
(2002)
Transactions on Wireless Communications (IEEE)
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
125
-
-
84943807207
-
Towards secure key distribution in truly ad-hoc network. Symposium on Applications and the Internet Workshops
-
Khalili, A., J. Katz, and A. Arbaugh. Towards secure key distribution in truly ad-hoc network. Symposium on Applications and the Internet Workshops. IEEE, 2003, 342–346.
-
(2003)
IEEE
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, A.3
-
126
-
-
70449525340
-
Detecting Sybil attacks in wireless sensor networks using neighboring information
-
December
-
Kuo-Feng, S., W. Wei-Tong, and C. Wen-Chung. Detecting Sybil attacks in wireless sensor networks using neighboring information. Computer Networks (Elsevier) 53, no. 18 (December 2009): 3042–3056.
-
(2009)
Computer Networks (Elsevier)
, vol.53
, Issue.18
, pp. 3042-3056
-
-
Kuo-Feng, S.1
Wei-Tong, W.2
Wen-Chung, C.3
-
128
-
-
85055373056
-
A secure routing protocol for cluster-based wireless sensor networks using id-based digital signature
-
Lu, H., J. Li, and H. Kameda. A secure routing protocol for cluster-based wireless sensor networks using id-based digital signature. Global Telecommunications Conference. IEEE, 2010, 1–5.
-
(2010)
Global Telecommunications Conference. IEEE
, pp. 1-5
-
-
Lu, H.1
Li, J.2
Kameda, H.3
-
129
-
-
12744272926
-
Secure cluster based energy aware routing for wireless sensor networks
-
Mallanda, C., S. Basavaraju, A. Kulshrestha, R. Kannan, A. Durresi, and S. S. Iyengar. Secure cluster based energy aware routing for wireless sensor networks. Proceedings of International Conference on Wireless Networks. CSREA, 2004, 461–466.
-
(2004)
Proceedings of International Conference on Wireless Networks. CSREA
, pp. 461-466
-
-
Mallanda, C.1
Basavaraju, S.2
Kulshrestha, A.3
Kannan, R.4
Durresi, A.5
Iyengar, S.S.6
-
130
-
-
0012132506
-
A non-interactive public-key distribution system
-
Maurer, U. M., and Y. Yacobi. A non-interactive public-key distribution system. Designs, Codes and Cryptography (Kluwer) 9, no. 3 (1996): 305–316.
-
(1996)
Designs, Codes and Cryptography (Kluwer)
, vol.9
, Issue.3
, pp. 305-316
-
-
Maurer, U.M.1
Yacobi, Y.2
-
131
-
-
3042785862
-
The Sybil attack in sensor networks
-
Newsome, J., E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. Third International Symposium on Information Processing in Sensor Networks, IPSN. IEEE, 2004, 259–268.
-
(2004)
Analysis & Defenses. Third International Symposium on Information Processing in Sensor Networks, IPSN. IEEE
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
132
-
-
34547913472
-
SecLEACH—On the security of clustered sensor networks
-
Oliveira, L. B., A. Ferreira, M. A. Vilaça, H. C. Wong, M. Bern, R. Dahab, and A. F. F. Loureiro. SecLEACH—On the security of clustered sensor networks. Signal Processing (Elsevier) 87, no. 12 (2007): 2882–2895.
-
(2007)
Signal Processing (Elsevier)
, vol.87
, Issue.12
, pp. 2882-2895
-
-
Oliveira, L.B.1
Ferreira, A.2
Vilaça, M.A.3
Wong, H.C.4
Bern, M.5
Dahab, R.6
Loureiro, A.F.F.7
-
134
-
-
85031307530
-
Highly dynamic destination sequenced distance-vector routing for mobile computers
-
Perkins, C., and P. Bhagwat. Highly dynamic destination sequenced distance-vector routing for mobile computers. ACM’s Computer Communication Review (ACM), 1994, 234–244.
-
(1994)
ACM’s Computer Communication Review (ACM)
, pp. 234-244
-
-
Perkins, C.1
Bhagwat, P.2
-
135
-
-
0036738266
-
SPINS: Security protocols for sensor
-
Perrig, A., R. Szewczyk, J. Tygar, V. Wen, and D. Culler. SPINS: security protocols for sensor. Wireless Networks 8, no. 5 (2002): 521–534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
137
-
-
84942436269
-
Data MULEs: Modeling a three-tier architecture for sparse sensor networks
-
Shah, R. C., S. Roy, S. Jain, and W. Brunette. Data MULEs: modeling a three-tier architecture for sparse sensor networks. Sensor Network Protocols and Applications. IEEE, 2003, 30–41.
-
(2003)
Sensor Network Protocols and Applications. IEEE
, pp. 30-41
-
-
Shah, R.C.1
Roy, S.2
Jain, S.3
Brunette, W.4
-
140
-
-
25844505160
-
Exploiting Heterogeneity in Sensor Networks. 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
Yarvis, M., N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh. Exploiting Heterogeneity in Sensor Networks. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, 2005, 878–890.
-
(2005)
IEEE
, pp. 878-890
-
-
Yarvis, M.1
Kushalnagar, N.2
Singh, H.3
Rangarajan, A.4
Liu, Y.5
Singh, S.6
-
141
-
-
34548825399
-
PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks
-
Yia, S., J. Heo, Y. Cho, and J. Hong. PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks. Computer Communications (Elsevier) 30, no. 14–15 (2007): 2842–2852.
-
(2007)
Computer Communications (Elsevier)
, vol.30
, Issue.14-15
, pp. 2842-2852
-
-
Yia, S.1
Heo, J.2
Cho, Y.3
Hong, J.4
-
142
-
-
0003405130
-
Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Tech Report
-
Yu, Y., R. Govindan, and D. Estrin. Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Tech Report, UCLA, 2001.
-
(2001)
UCLA
-
-
Yu, Y.1
Govindan, R.2
Estrin, D.3
-
144
-
-
0002348257
-
TCP and explicit congestion notification
-
Floyd, S. TCP and explicit congestion notification. SIGCOMM Computer Communication Review 24, no. 5 (1994): 8–23.
-
(1994)
SIGCOMM Computer Communication Review
, vol.24
, Issue.5
, pp. 8-23
-
-
Floyd, S.1
-
145
-
-
33847047632
-
Hints and notifications. Wireless Communications and Networking Conference
-
Larzon, L.-A., U. Bodin, and O. Schelen. Hints and notifications. Wireless Communications and Networking Conference. IEEE, 2002, 635–641.
-
(2002)
IEEE
, pp. 635-641
-
-
Larzon, L.-A.1
Bodin, U.2
Schelen, O.3
-
150
-
-
0242386636
-
Cross-layer design for wireless networks
-
Shakkottai, S., T. S. Rappaport, and P. C. Karlsson. Cross-layer design for wireless networks. Communications Magazine . IEEE, 41, no. 10 (2003): 74–80.
-
(2003)
Communications Magazine . IEEE
, vol.41
, Issue.10
, pp. 74-80
-
-
Shakkottai, S.1
Rappaport, T.S.2
Karlsson, P.C.3
-
151
-
-
11244298650
-
-
MobiCom ‘04. ACM
-
Zhengrong, Ji, Y. Yang, Z. Junlan, T. Mineo, and R. Bagrodia. Exploiting medium access diversity in rate adaptive wireless LANs. MobiCom ‘04. ACM, n.d., 345–359.
-
Exploiting Medium Access Diversity in Rate Adaptive Wireless Lans
, pp. 345-359
-
-
Zhengrong, J.1
Yang, Y.2
Junlan, Z.3
Mineo, T.4
Bagrodia, R.5
-
152
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties
-
Barreto, L. M., S. Galbraith, C. O’Heigeartaigh, and M. Scott. Efficient pairing computation on supersingular abelian varieties. Designs, Codes and Cryptography 42 (2007): 239–271.
-
(2007)
Designs, Codes and Cryptography
, vol.42
, pp. 239-271
-
-
Barreto, L.M.1
Galbraith, S.2
O’Heigeartaigh, C.3
Scott, M.4
-
153
-
-
85027967075
-
Fast exponentiation with precomputation
-
Brickell, E. F., D. M. Gordon, K. S. McCurley, and D. B. Wilson. Fast exponentiation with precomputation. Advances in Cryptology-Proceedings of EUROCRYPT 1992, Lecture Notes in Computer Science. Springer-Verlag, 1993, 200–207.
-
(1993)
Advances in Cryptology-Proceedings of EUROCRYPT 1992, Lecture Notes in Computer Science
, pp. 200-207
-
-
Brickell, E.F.1
Gordon, D.M.2
McCurley, K.S.3
Wilson, D.B.4
-
154
-
-
85055379582
-
Standards for efficient cryptography – SEC 2: Recommended elliptic curve domain parameters
-
Certicom. Standards for efficient cryptography – SEC 2: Recommended elliptic curve domain parameters. Certicom, 2000.
-
(2000)
Certicom
-
-
Certicom1
-
155
-
-
10444273896
-
Exponentiation cryptosystems on the IBM PC
-
Comba, P. Exponentiation cryptosystems on the IBM PC. IBM System (1990): 526–538.
-
(1990)
IBM System
, pp. 526-538
-
-
Comba, P.1
-
156
-
-
24944433266
-
Architectural extensions for elliptic curve cryptography over GF(2m) on 8-bit microprocessors
-
IEEE
-
Eberle, H., A. Wander, N. Gura, S. Chang-Shantz, and V. Gupta. Architectural extensions for elliptic curve cryptography over GF(2m) on 8-bit microprocessors. 16th International Conference on Application-Specific Systems, Architectures and Processors. IEEE, 2005, 343–349.
-
(2005)
16Th International Conference on Application-Specific Systems, Architectures and Processors
, pp. 343-349
-
-
Eberle, H.1
Wander, A.2
Gura, N.3
Chang-Shantz, S.4
Gupta, V.5
-
157
-
-
3242670828
-
Field inversion and point halving revisited
-
Fong, K., D. Hankerson, J. Lopez, and A. Menezes. Field inversion and point halving revisited. IEEE Transactions on Computers 53 (2004): 1047–1059.
-
(2004)
IEEE Transactions on Computers
, vol.53
, pp. 1047-1059
-
-
Fong, K.1
Hankerson, D.2
Lopez, J.3
Menezes, A.4
-
158
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Gura, N., A. Patel, A. Wander, H. Eberle, and S. C. Shantz. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. 6th International Workshop on Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science). Springer, 2004, 119–132.
-
6Th International Workshop on Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science). Springer
, vol.2004
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
163
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. 7th International Conference on Information Processing in Sensor Networks
-
Liu, A., and P. Ping. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. 7th International Conference on Information Processing in Sensor Networks. IEEE, 2008, 245–256.
-
(2008)
IEEE
, pp. 245-256
-
-
Liu, A.1
Ping, P.2
-
165
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
Malan, D. J., M. Welsh, and M. D. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. IEEE SECON 2004: 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (Oct. 4–7, 2004). IEEE, 2004, 71–80
-
(2004)
IEEE SECON 2004: 1St Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
168
-
-
84966243285
-
Modular multiplication without division
-
American Mathematical Society
-
Montgomery, P. Modular multiplication without division. Mathematics of Computation (American Mathematical Society) 44 (1985): 519–521.
-
(1985)
Mathematics of Computation
, vol.44
, pp. 519-521
-
-
Montgomery, P.1
-
169
-
-
0013145165
-
-
National Institute of Standards and Technology
-
NIST. Recommended elliptic curves for Federal government use. National Institute of Standards and Technology, 1999. http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.doc
-
(1999)
Recommended Elliptic Curves for Federal Government Use
-
-
-
171
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(P) and its cryptographic significance. Edited by IEEE. Transactions on Information
-
Pohlig, S., and M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. Edited by IEEE. Transactions on Information Theory 24 (1978): 106–110.
-
(1978)
Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
173
-
-
68149165367
-
TinyECCK: Efficient elliptic curve cryptography implementation over G(2) on 8-bit MICAz mote
-
Seo, S. C., D. Han, and S. Hong. TinyECCK: Efficient elliptic curve cryptography implementation over G(2) on 8-bit MICAz mote. IEICE Transactions. IEICE, 2008.
-
(2008)
IEICE Transactions. IEICE
-
-
Seo, S.C.1
Han, D.2
Hong, S.3
-
176
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. European Conference on Wireless Sensor Networks
-
Szczechowiak, P, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab. NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. European Conference on Wireless Sensor Networks, Lecture Notes in Computer Science. Springer, 2008, 305–320.
-
(2008)
Lecture Notes in Computer Science
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
177
-
-
37149040069
-
Enabling full-size public-key algorithms on 8-bit sensor nodes
-
Uhsadel, L., A. Poschmann, and C. Paar. Enabling full-size public-key algorithms on 8-bit sensor nodes. European Workshop on Security and Privacy in Ad Hoc and Sensor Networks: Lecture Notes in Computer Science. Springer, 2007, 73–86.
-
European Workshop on Security and Privacy in Ad Hoc and Sensor Networks: Lecture Notes in Computer Science. Springer
, vol.2007
, pp. 73-86
-
-
Uhsadel, L.1
Poschmann, A.2
Paar, C.3
|