-
2
-
-
84861997111
-
Survey Internet of things:Vision, applications and research challenges
-
2012
-
D. Miorandi, S. Sicari, F. De Pellegrini and I. Chlamtac, Survey Internet of things:Vision, applications and research challenges, Ad Hoc Netw. 10, 7 2012), pp.1497-1516, 2012.
-
(2012)
Ad Hoc Netw.
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
3
-
-
84871235333
-
ID-based one-pass authenticated key establishment
-
M. Choudary Gorantla, C. Boyd and J.M.G. Nieto, ID-based One-pass Authenticated Key Establishment, the sixth Australasian conference on Information security-vol 81, pages 39-46, 2008.
-
(2008)
The Sixth Australasian Conference on Information Security
, vol.81
, pp. 39-46
-
-
Choudary Gorantla, M.1
Boyd, C.2
Nieto, J.M.G.3
-
5
-
-
84979578939
-
-
Liu Yang, Peng Yu, Wang Bailing, Bai Xuefeng, Yuan Xinling and Li Geng IOT SecureTransmission Based on Integration of IBE and PKI/CA(2013).
-
(2013)
I OT SecureTransmission Based on Integration of IBE and PKI/CA
-
-
Yang, L.1
Yu, P.2
Bailing, W.3
Xuefeng, B.4
Xinling, Y.5
Geng, L.6
-
7
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Advances in Cryptology-CRYPTO, Lecture Notes in Computer Science vol. 2139, pp 213-229, 2001.
-
(2001)
Advances in Cryptology-CRYPTO, Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
84979578937
-
-
IETF RFC 6090, February 2011, Fundamental Elliptic Curve Cryptography Algorithms
-
IETF RFC 6090, February 2011, Fundamental Elliptic Curve Cryptography Algorithms.
-
-
-
-
9
-
-
84899066486
-
Hash function and digital signature based on elliptic curve
-
December
-
D. Manel, O. Raouf, H. Ramzi and A. Mtibaa, Hash Function and Digital Signature based on Elliptic Curve, 14th international conference on Sciences and Techniques of Automaticcontrol and computer engineering, December 2013 27.
-
(2013)
14th International Conference on Sciences and Techniques of Automaticcontrol and Computer Engineering
, pp. 27
-
-
Manel, D.1
Raouf, O.2
Ramzi, H.3
Mtibaa, A.4
-
10
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
D.Huang, Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , Int. J. Security and Networks, Vol. 2, N 3/4, 2007.
-
(2007)
Int. J. Security and Networks
, vol.2
, Issue.3-4
-
-
Huang, D.1
-
11
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
Barcelona, Spain, June
-
S. Raza, S. Duquennoy, A. Chung, D. Yazar, T. Voigt, and U. Roedig, Securing communication in 6LoWPAN with compressed IPsec, in Proceedings of the 7th International Conference on Distributed Computing in Sensor Systems (DCOSS '11), pp. 18, Barcelona, Spain, June 2011.
-
(2011)
Proceedings of the 7th International Conference on Distributed Computing in Sensor Systems (DCOSS '11)
, pp. 18
-
-
Raza, S.1
Duquennoy, S.2
Chung, A.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
12
-
-
84983089516
-
The security of cipher block chaining
-
Y. Desmedt ed., Springer-Verlag
-
M. Bellare, J. Kilian and P. Rogaway. The security of cipher block chaining.Advances in Cryptology Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology Crypto 94 Proceedings, Lecture Notes in Computer Science
, vol.839
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
13
-
-
84863136769
-
Towards efficient anonymous communications in sensor networks
-
J. Chen, H. Zhang, B. Fang, X. Du, L. Yin, X. Yu, Towards efficient anonymous communications in sensor networks, in: IEEE Global Telecommunications Conference (GLOBECOM), IEEE Communications Society, 2011, pp. 15.
-
(2011)
IEEE Global Telecommunications Conference (GLOBECOM), IEEE Communications Society
, pp. 15
-
-
Chen, J.1
Zhang, H.2
Fang, B.3
Du, X.4
Yin, L.5
Yu, X.6
-
15
-
-
84895207016
-
Tinyos: An operating system for sensor networks
-
W. Weber, J. M. Rabaey, and E. Aarts, Eds. Berlin/Heidelberg: Springer-Verlag, ch. 7
-
P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, and D. Culler, "TinyOS: An Operating System for Sensor Networks," in Ambient Intelligence, W. Weber, J. M. Rabaey, and E. Aarts, Eds. Berlin/Heidelberg: Springer-Verlag, 2005, ch. 7, pp. 115-148.
-
(2005)
Ambient Intelligence
, pp. 115-148
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Whitehouse, K.5
Woo, A.6
Gay, D.7
Hill, J.8
Welsh, M.9
Brewer, E.10
Culler, D.11
|