-
1
-
-
84942548166
-
-
Low power listening
-
Low power listening, http://tinyos.stanford.edu/tinyos-wiki/index.php/writing low-power applications.
-
-
-
-
2
-
-
84942548167
-
-
Parrot
-
Parrot, http://ardrone2.parrot.com.
-
-
-
-
3
-
-
0345490607
-
Certificateless public key cryptography
-
C.-S. Laih, editor, Springer
-
S. Al-Riyami and K. Paterson. Certificateless public key cryptography. In C.-S. Laih, editor, ASIACRYPT, volume 2894 of LNCS, pages 452-473. Springer, 2003.
-
(2003)
ASIACRYPT, Volume 2894 of LNCS
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
4
-
-
47749097108
-
An adaptive data-transfer protocol for sensor networks with data mules
-
G. Anastasi, M. Conti, E. Monaldi, and A. Passarella. An adaptive data-transfer protocol for sensor networks with data mules. In WoWMoM, pages 1-8, 2007.
-
(2007)
WoWMoM
, pp. 1-8
-
-
Anastasi, G.1
Conti, M.2
Monaldi, E.3
Passarella, A.4
-
5
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of CRYPTO '01, pages 213-229. Springer, 2001.
-
(2001)
Proceedings of CRYPTO'01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
7
-
-
84875103762
-
An improved id-based key management scheme in wireless sensor network
-
Springer
-
K. Chatterjee, A. De, and D. Gupta. An improved id-based key management scheme in wireless sensor network. In Advances in Swarm Intelligence, volume 7332 of LNCS, pages 351-359. Springer, 2012.
-
(2012)
Advances in Swarm Intelligence, Volume 7332 of LNCS
, pp. 351-359
-
-
Chatterjee, K.1
De, A.2
Gupta, D.3
-
9
-
-
77949302373
-
Provably secure certificateless two-party authenticated key agreement protocol without pairing
-
M. Geng and F. Zhang. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In CIS '09, pages 208-212, 2009.
-
(2009)
CIS'09
, pp. 208-212
-
-
Geng, M.1
Zhang, F.2
-
10
-
-
80052632132
-
A pairing-free certificateless authenticated key agreement protocol
-
D. He, J. Chen, and J. Hu. A pairing-free certificateless authenticated key agreement protocol. Int. Journal of Comm. Sys., pages 221-230, 2012.
-
(2012)
Int. Journal of Comm. Sys.
, pp. 221-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
13
-
-
51249087814
-
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
-
April
-
A. Liu and P. Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN '08, pages 245-256, April 2008.
-
(2008)
IPSN'08
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
14
-
-
84942548171
-
-
K. MacKay. https://github.com/kmackay/micro-ecc.
-
-
-
MacKay, K.1
-
15
-
-
77957230388
-
Private key agreement and secure communication for heterogeneous sensor networks
-
Aug.
-
S. M. Mizanur Rahman and K. El-Khatib. Private key agreement and secure communication for heterogeneous sensor networks. J. Parallel Distrib. Comput., 70(8):858-870, Aug. 2010.
-
(2010)
J. Parallel Distrib. Comput.
, vol.70
, Issue.8
, pp. 858-870
-
-
Mizanur Rahman, S.M.1
El-Khatib, K.2
-
16
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. JOURNAL OF CRYPTOLOGY, 13:361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
18
-
-
84942548172
-
Secure data collection scheme in wireless sensor network with mobile sink
-
A. Rasheed and R. Mahapatra. Secure data collection scheme in wireless sensor network with mobile sink. In IEEE NCA '08, 2008.
-
(2008)
IEEE NCA '08
-
-
Rasheed, A.1
Mahapatra, R.2
-
19
-
-
3042785191
-
Optimizing sensor networks in the energy-latency-density design space
-
Jan
-
C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. Srivastava. Optimizing sensor networks in the energy-latency-density design space. Mobile Computing, IEEE Trans. on, 1(1):70-80, Jan 2002.
-
(2002)
Mobile Computing, IEEE Trans. on
, vol.1
, Issue.1
, pp. 70-80
-
-
Schurgers, C.1
Tsiatsis, V.2
Ganeriwal, S.3
Srivastava, M.4
-
20
-
-
78650296889
-
Certificateless kem and hybrid signcryption schemes revisited
-
Springer
-
S. Selvi, S. Vivek, and C. Rangan. Certificateless kem and hybrid signcryption schemes revisited. In Information Security, Practice and Experience, volume 6047 of LNCS, pages 294-307. Springer, 2010.
-
(2010)
Information Security, Practice and Experience, Volume 6047 of LNCS
, pp. 294-307
-
-
Selvi, S.1
Vivek, S.2
Rangan, C.3
-
21
-
-
84942548173
-
Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing
-
S. Seo and E. Bertino. Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing, http://www.cerias.purdue.edu/apps/reports and papers/view/4698. CERIAS report, '13.
-
CERIAS report,'13
-
-
Seo, S.1
Bertino, E.2
-
22
-
-
84942436269
-
Data mules: Modeling a three-tier architecture for sparse sensor networks
-
R. Shah, S. Roy, S. Jain, and W. Brunette. Data mules: modeling a three-tier architecture for sparse sensor networks. In SNPA '03, Proceedings, 2003.
-
(2003)
SNPA '03, Proceedings
-
-
Shah, R.1
Roy, S.2
Jain, S.3
Brunette, W.4
-
23
-
-
51849099823
-
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks
-
Sept.
-
H. Song, S. Zhu, W. Zhang, and G. Cao. Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. ACM Trans. Sen. Netw., 4(4):23:1-23:34, Sept. 2008.
-
(2008)
ACM Trans. Sen. Netw.
, vol.4
, Issue.4
, pp. 231-2334
-
-
Song, H.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
24
-
-
84880802438
-
A novel pairing-free certificateless authenticated key agreement protocol with provable security
-
H. Sun, Q. Wen, H. Zhang, and Z. Jin. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers of Computer Science, 7(4):544-557, 2013.
-
(2013)
Frontiers of Computer Science
, vol.7
, Issue.4
, pp. 544-557
-
-
Sun, H.1
Wen, Q.2
Zhang, H.3
Jin, Z.4
-
25
-
-
17444417505
-
Eficient collection of sensor data in remoteélds using mobile collectors
-
Y. Tirta, Z. Li, Y.-H. Lu, and S. Bagchi. Eficient collection of sensor data in remoteélds using mobile collectors. In ICCCN '04. Proceedings, 2004.
-
(2004)
ICCCN '04. Proceedings
-
-
Tirta, Y.1
Li, Z.2
Lu, Y.-H.3
Bagchi, S.4
-
26
-
-
79956037223
-
Strongly secure certificateless key exchange without pairing
-
G. Yang and C.-H. Tan. Strongly secure certificateless key exchange without pairing. In ASIACCS, 2011.
-
(2011)
ASIACCS
-
-
Yang, G.1
Tan, C.-H.2
-
28
-
-
4444277059
-
A message ferrying approach for data delivery in sparse mobile ad hoc networks
-
W. Zhao, M. Ammar, and E. Zegura. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In ACM MobiHoc, pages 187-198, 2004.
-
(2004)
ACM MobiHoc
, pp. 187-198
-
-
Zhao, W.1
Ammar, M.2
Zegura, E.3
-
29
-
-
39049087772
-
Supporting secure communication and data collection in mobile sensor networks
-
L. Zhou, J. Ni, and C. Ravishankar. Supporting secure communication and data collection in mobile sensor networks. In INFOCOM '06. Proceedings, 2006.
-
(2006)
INFOCOM '06. Proceedings
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.3
|