-
1
-
-
0037086890
-
Wireless sensor networks: a survey
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. Computer Networks, 38(4):393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
77956882701
-
Wireless sensor networks for healthcare: A survey
-
H. Alemdar and C. Ersoy. Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15):2688-2710, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2688-2710
-
-
Alemdar, H.1
Ersoy, C.2
-
6
-
-
85027967075
-
Fast exponentiation with precomputation
-
E. Brickell, D. Gordon, K. McCurley, and D. Wilson. Fast exponentiation with precomputation. In Advances in Cryptology - EUROCRYPT '92, volume 658 of Lecture Notes in Comp. Sci., pages 200-207, 1993.
-
(1993)
Advances in Cryptology - EUROCRYPT '92, volume 658 of Lecture Notes in Comp. Sci
, pp. 200-207
-
-
Brickell, E.1
Gordon, D.2
McCurley, K.3
Wilson, D.4
-
7
-
-
38049175146
-
Expansion properties of random cayley graphs and vertex transitive graphs via matrix martingales
-
D. Christofides and K. Markstrom. Expansion properties of random cayley graphs and vertex transitive graphs via matrix martingales. Random Structures Algorithms, 32(1):271-284, 2008.
-
(2008)
Random Structures Algorithms
, vol.32
, Issue.1
, pp. 271-284
-
-
Christofides, D.1
Markstrom, K.2
-
9
-
-
84949200440
-
Fast generation of pairs (k, [k]p) for koblitz elliptic curves
-
J. S. Coron, D. M. Raihi, and C. Tymen. Fast generation of pairs (k, [k]p) for koblitz elliptic curves. In Selected Areas in Cryptography, pages 151-164, 2001.
-
(2001)
Selected Areas in Cryptography
, pp. 151-164
-
-
Coron, J. S.1
Raihi, D. M.2
Tymen, C.3
-
10
-
-
85180416753
-
-
Document Part Number: 6020-0042-04
-
Crossbow Technology. MICA2 mote platform datasheet. Document Part Number: 6020-0042-04.
-
MICA2 mote platform datasheet
-
-
-
11
-
-
84877683889
-
-
Document Part Number: 6020-0094-01 Rev B
-
Crossbow Technology. TelosB mote platform datasheet. Document Part Number: 6020-0094-01 Rev B.
-
TelosB mote platform datasheet
-
-
-
12
-
-
82455192596
-
Lark: A lightweight authenticated rekeying scheme for clustered wireless sensor networks
-
41
-
G. Dini and I. M. Savino. Lark: A lightweight authenticated rekeying scheme for clustered wireless sensor networks. ACM Trans. Embed. Comput. Syst., 10(4):41:1-41:35, 2011.
-
(2011)
ACM Trans. Embed. Comput. Syst
, vol.10
, Issue.4
, pp. 1-41:35
-
-
Dini, G.1
Savino, I. M.2
-
13
-
-
56749092208
-
Comparison of innovative signature algorithms for wsns
-
B. Driessen, A. Poschmann, and C. Paar. Comparison of innovative signature algorithms for wsns. In ACM WiSec. 2008.
-
(2008)
ACM WiSec
-
-
Driessen, B.1
Poschmann, A.2
Paar, C.3
-
14
-
-
78650893188
-
Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless
-
P. Dutta, S. Dawson-Haggerty, Y. Chen, C.-J. M. Liang, and A. Terzis. Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless. In Proc. 8th ACM Conf on Embedded Networked Sensor Systems, SenSys'10, pages 1-14, 2010.
-
(2010)
Proc. 8th ACM Conf on Embedded Networked Sensor Systems, SenSys'10
, pp. 1-14
-
-
Dutta, P.1
Dawson-Haggerty, S.2
Chen, Y.3
Liang, C.-J. M.4
Terzis, A.5
-
15
-
-
85028913061
-
On-line/off-line digital signatures
-
S. Even, O. Goldreich, and S. Micali. On-line/off-line digital signatures. In Proceedings on Advances in cryptology, CRYPTO'89, pages 263-275, 1989.
-
(1989)
Proceedings on Advances in cryptology, CRYPTO'89
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
19
-
-
77956607253
-
Opportunities and challenges of wireless sensor networks in smart grid
-
V. C. Gungor, B. L. B. Lu, and G. P. Hancke. Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10):3557-3564, 2010.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.10
, pp. 3557-3564
-
-
Gungor, V. C.1
Lu, B. L. B.2
Hancke, G. P.3
-
21
-
-
81055124247
-
Lep: A lightweight key management scheme based on ebs and polynomial for wireless sensor networks
-
R. Jiang, J. Luo, F. Tu, and J. Zhong. Lep: A lightweight key management scheme based on ebs and polynomial for wireless sensor networks. In IEEE Int. Conf. on Signal Processing, Communications and Computing (ICSPCC), pages 1-5, 2011.
-
(2011)
IEEE Int. Conf. on Signal Processing, Communications and Computing (ICSPCC)
, pp. 1-5
-
-
Jiang, R.1
Luo, J.2
Tu, F.3
Zhong, J.4
-
24
-
-
84905854254
-
Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea
-
L. Krishnamurthy, R. Adler, P. Buonadonna, J. Chhabra, M. Flanigan, N. Kushalnagar, L. Nachman, and M. Yarvis. Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea. In 3rd int. conf. on Embedded networked sensor systems, SenSys'05, pages 64-75, 2005.
-
(2005)
3rd int. conf. on Embedded networked sensor systems, SenSys'05
, pp. 64-75
-
-
Krishnamurthy, L.1
Adler, R.2
Buonadonna, P.3
Chhabra, J.4
Flanigan, M.5
Kushalnagar, N.6
Nachman, L.7
Yarvis, M.8
-
25
-
-
5344256280
-
Random cayley graphs are expanders: a simple proof of the alon-roichman theorem
-
Z. Landau and A. Russell. Random cayley graphs are expanders: a simple proof of the alon-roichman theorem. Electronic Journal of Combinatorics, 11(1), 2004.
-
(2004)
Electronic Journal of Combinatorics
, vol.11
, Issue.1
-
-
Landau, Z.1
Russell, A.2
-
26
-
-
33744910431
-
Tinyos: An operating system for sensor networks
-
Springer Verlag
-
P. Levis, S. Madden, J. Polastre, R. Szewczyk, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, and D. Culler. Tinyos: An operating system for sensor networks. In in Ambient Intelligence. Springer Verlag, 2004.
-
(2004)
Ambient Intelligence
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Woo, A.5
Gay, D.6
Hill, J.7
Welsh, M.8
Brewer, E.9
Culler, D.10
-
28
-
-
51249087814
-
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
A. Liu and P. Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on Information processing in sensor networks, IPSN'08, pages 245-256, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 7th international conference on Information processing in sensor networks, IPSN'08
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
29
-
-
77955088735
-
Efficient online/offline identity-based signature for wireless sensor network
-
J. Liu, J. Baek, J. Zhou, Y. Yang, and J. Wong. Efficient online/offline identity-based signature for wireless sensor network. International Journal of Information Security, 9(4):287-296, 2010.
-
(2010)
International Journal of Information Security
, vol.9
, Issue.4
, pp. 287-296
-
-
Liu, J.1
Baek, J.2
Zhou, J.3
Yang, Y.4
Wong, J.5
-
31
-
-
70349308780
-
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
-
J. Lopez, R. Roman, and C. Alcaraz. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of Security Analysis and Design V, volume 5705 of Lecture Notes in Comp. Sci., pages 289-338, 2009.
-
(2009)
Foundations of Security Analysis and Design V, volume 5705 of Lecture Notes in Comp. Sci
, pp. 289-338
-
-
Lopez, J.1
Roman, R.2
Alcaraz, C.3
-
32
-
-
84863117782
-
A half-key key management scheme for wireless sensor networks
-
Y.-F. Lu, C.-F. Kuo, and A.-C. Pang. A half-key key management scheme for wireless sensor networks. In Proc. of the 2011 ACM Symp. on Research in Applied Computation, RACS'11, pages 255-260, 2011.
-
(2011)
Proc. of the 2011 ACM Symp. on Research in Applied Computation, RACS'11
, pp. 255-260
-
-
Lu, Y.-F.1
Kuo, C.-F.2
Pang, A.-C.3
-
35
-
-
51249108948
-
Koala: Ultra-low power data retrieval in wireless sensor networks
-
E., and, Washington, DC, USA, IEEE Computer Society
-
R. Musaloiu-E., C.-J. M. Liang, and A. Terzis. Koala: Ultra-low power data retrieval in wireless sensor networks. In Proc of the 7th int. conf. on Information processing in sensor networks, IPSN'08, pages 421-432, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proc of the 7th int. conf. on Information processing in sensor networks, IPSN'08
, pp. 421-432
-
-
Musaloiu, R.1
Liang, C.-J. M.2
Terzis, A.3
-
38
-
-
85019647480
-
The hardness of the hidden subset sum problem and its cryptographic implications
-
M. Wiener, editor, pages Springer Berlin/Heidelberg
-
P. Nguyen and J. Stern. The hardness of the hidden subset sum problem and its cryptographic implications. In M. Wiener, editor, Advances in Cryptology - CRYPTO 99, volume 1666 of Lecture Notes in Computer Science, pages 786-786. Springer Berlin/Heidelberg, 1999.
-
(1999)
Advances in Cryptology - CRYPTO 99, volume 1666 of Lecture Notes in Computer Science
, pp. 786-786
-
-
Nguyen, P.1
Stern, J.2
-
40
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C. P.1
-
42
-
-
84862135412
-
A survey on wireless sensor network security
-
abs/1011.1529
-
J. Sen. A survey on wireless sensor network security. CoRR, abs/1011.1529, 2010.
-
(2010)
CoRR
-
-
Sen, J.1
-
44
-
-
84869593024
-
Wireless sensor network security
-
S. Sharma, A. Sahu, A. Verma, and N. Shukla. Wireless sensor network security. In Advances in Computer Science and Information Technology, volume 86, pages 317-326, 2012.
-
(2012)
Advances in Computer Science and Information Technology
, vol.86
, pp. 317-326
-
-
Sharma, S.1
Sahu, A.2
Verma, A.3
Shukla, N.4
-
46
-
-
77951457816
-
Theoretical and practical aspects of military wireless sensor networks
-
M. Winkler, K.-D. Tuchs, K. Hughes, and G. Barclay. Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications and Information Technology, pages 37-45, 2008.
-
(2008)
Journal of Telecommunications and Information Technology
, pp. 37-45
-
-
Winkler, M.1
Tuchs, K.-D.2
Hughes, K.3
Barclay, G.4
-
47
-
-
70350692585
-
Securing wireless sensor networks: a survey
-
Y. Zhou, Y. Fang, and Y. Zhang. Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials, 10(3):6-28, 2008.
-
(2008)
IEEE Communications Surveys & Tutorials
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
48
-
-
84860685134
-
A lightweight security framework for wireless sensor networks
-
T. A. Zia and A. Y. Zomaya. A lightweight security framework for wireless sensor networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2(3):53-73, 2011.
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.2
, Issue.3
, pp. 53-73
-
-
Zia, T. A.1
Zomaya, A. Y.2
|