-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey, " Elsevier Computer Networks, volume 38, Issue 4, pp. 393-422, March 2002.
-
(2002)
Elsevier Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
20344392154
-
Bench-marking block ciphers for wireless sensor networks
-
page electronic edition, Fort Lauderdale, Florida, IEEE Computer Society Press, Los Alamitos, California, Oct
-
Y. W. Law, J. M. Doumen, and P. H. Hartel, "Bench-marking block ciphers for wireless sensor networks, " 1st IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems (MASS), page electronic edition, Fort Lauderdale, Florida, IEEE Computer Society Press, Los Alamitos, California, Oct 2004.
-
(2004)
1st IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems (MASS)
-
-
Law, Y.W.1
Doumen, J.M.2
Hartel, P.H.3
-
3
-
-
77950865305
-
Security in wireless sensor networks
-
Springer London
-
E. Sabbah, and K. D. Kang, "Security in Wireless Sensor Networks, " Guide to Wireless Sensor Networks, Computer Communications and Networks, pp. 491-512, Springer London, 2009.
-
(2009)
Guide to Wireless Sensor Networks, Computer Communications and Networks
, pp. 491-512
-
-
Sabbah, E.1
Kang, K.D.2
-
4
-
-
44049101044
-
Sensor data cryptography in wireless sensor networks
-
T. C. Aysal, and K. E. Barner, "Sensor data cryptography in wireless sensor networks, " IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 273-289, 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 273-289
-
-
Aysal, T.C.1
Barner, K.E.2
-
6
-
-
84904651355
-
ECC over RSA for asymmetric encryption: A review
-
K. Gupta, and S. Silakari, "ECC over RSA for Asymmetric Encryption: A Review, " International Journal of Computer Science Issues (IJCSI), Vol. 8 Issue 3, pp. 370-375, 2011.
-
(2011)
International Journal of Computer Science Issues (IJCSI)
, vol.8
, Issue.3
, pp. 370-375
-
-
Gupta, K.1
Silakari, S.2
-
7
-
-
35348910049
-
Wireless Sensor network security: A survey
-
Grid, and Pervasive Computing, Auerbach Publications, CRC Press
-
J. P. Walters, and all., " Wireless Sensor network security: A survey, " Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, pp. 1-49, 2007.
-
(2007)
Security in Distributed
, pp. 1-49
-
-
Walters, J.P.1
-
8
-
-
80053409313
-
Research on security issues in Wireless Sensor Networks
-
X. Guo, and J. Zhu, "Research on security issues in Wireless Sensor Networks, " EMEIT, pp. 636-639, 2011.
-
(2011)
EMEIT
, pp. 636-639
-
-
Guo, X.1
Zhu, J.2
-
9
-
-
77955109536
-
A survey of attacks, security mechanisms and challenges in wireless sensor networks
-
G. Padmavathi, and D. Shanmugapriya, "A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, " (IJCSIS'09) International Journal of Computer Science and Information Security, Vol. 4, No. 1&2, 2009.
-
(2009)
(IJCSIS'09) International Journal of Computer Science and Information Security
, vol.4
, Issue.1-2
-
-
Padmavathi, G.1
Shanmugapriya, D.2
-
10
-
-
79953759440
-
Research on encryption algorithm of data security for wireless sensor network
-
Q. CHEN, Z. TANG, Y. LI, Y. NIU, and J. MO, "Research on Encryption Algorithm of Data Security for Wireless Sensor Network, " Journal of Computational Information Systems, pp. 369-376, 2011.
-
(2011)
Journal of Computational Information Systems
, pp. 369-376
-
-
Chen, Q.1
Tang, Z.2
Li, Y.3
Niu, Y.4
Mo, J.5
-
11
-
-
51349098629
-
Identity-based key agreement and encryption for wireless sensor networks
-
May
-
G. Yang, C. Rong, C. Veigner, J. Wang, and H. Cheng, "Identity-Based Key Agreement and Encryption For Wireless Sensor Networks, " IJCSNS International Journal of Computer Science and Network Security, VOL. 6 No. 5B, pp. 182-189, May 2006.
-
(2006)
IJCSNS International Journal of Computer Science and Network Security
, vol.6
, Issue.5 B
, pp. 182-189
-
-
Yang, G.1
Rong, C.2
Veigner, C.3
Wang, J.4
Cheng, H.5
-
12
-
-
77953512926
-
Performance evaluation of scalable encryption algorithm for wireless sensor networks
-
4 May
-
M. Cakroglu, C. Bayilmis, A. T. Ozcerit, and O. Cetin, "Performance evaluation of scalable encryption algorithm for wireless sensor networks, " Scientific Research and Essays, Vol. 5(9), pp. 856-861, 4 May, 2010.
-
(2010)
Scientific Research and Essays
, vol.5
, Issue.9
, pp. 856-861
-
-
Cakroglu, M.1
Bayilmis, C.2
Ozcerit, A.T.3
Cetin, O.4
-
13
-
-
80052241735
-
An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks
-
India
-
A. R. Ganesh, "An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks, " International Conference on Recent Trends in Information Technology (ICRTIT'2011), pp. 1209-1214, India, 2011.
-
(2011)
International Conference on Recent Trends in Information Technology (ICRTIT'2011)
, pp. 1209-1214
-
-
Ganesh, A.R.1
-
14
-
-
84868118722
-
Evaluation of a fast symmetric cryptographic algorithm based on the chaos theory for wireless sensor networks
-
June
-
I. Mansour, G. Chalhoub, and B. Bakhache, "Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks, " the 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'2012), pp. 913-919, June 2012.
-
(2012)
The 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'2012)
, pp. 913-919
-
-
Mansour, I.1
Chalhoub, G.2
Bakhache, B.3
-
15
-
-
84858275332
-
Implementation of cipher block chaining in wireless sensor networks for security enhancement
-
January
-
G. Kumar, M. Rai, and G. Lee, "Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement, "International Journal of Security and Its Applications, Vol. 6, January 2012.
-
(2012)
International Journal of Security and Its Applications
, vol.6
-
-
Kumar, G.1
Rai, M.2
Lee, G.3
-
16
-
-
80955148321
-
Design of encryption algorithm of data security for Wireless Sensor Network
-
Sept
-
Q. Chen, Q. Y. Chen, M. Yao, and J. Mo, "Design of encryption algorithm of data security for Wireless Sensor Network, " International Conference on Electrical and Control Engineering (ICECE'2011), pp. 2983-2986, Sept 2011.
-
(2011)
International Conference on Electrical and Control Engineering (ICECE'2011)
, pp. 2983-2986
-
-
Chen, Q.1
Chen, Q.Y.2
Yao, M.3
Mo, J.4
-
17
-
-
70350560499
-
A new embedded encryption algorithm for wireless sensor networks
-
May
-
L. Wei, X. Jianbo, T. Mingdong, and H. Li, "A New Embedded Encryption Algorithm for Wireless Sensor Networks, " International Forum on Information Technology and Applications (IFITA'09), Vol. 1, pp. 119-122, May 2009.
-
(2009)
International Forum on Information Technology and Applications (IFITA'09)
, vol.1
, pp. 119-122
-
-
Wei, L.1
Jianbo, X.2
Mingdong, T.3
Li, H.4
-
19
-
-
48249116384
-
EKAES: An efficient key agreement and encryption scheme for wireless sensor networks
-
C. Hongbing, Y. Geng, "EKAES: An efficient key agreement and encryption scheme for wireless sensor networks, " Journal of Electronics (China), Vol. 25, pp. 495-502, 2008.
-
(2008)
Journal of Electronics (China)
, vol.25
, pp. 495-502
-
-
Hongbing, C.1
Geng, Y.2
-
22
-
-
70449515072
-
The public key encryption to improve the security on wireless sensor networks
-
May
-
X. Chungen Xu, G. Yanhong, "The Public Key Encryption to Improve the Security on Wireless Sensor Networks, " Second International Conference on Information and Computing Science (ICIC '09), Vol. 1, pp. 11-14, May 2009.
-
(2009)
Second International Conference on Information and Computing Science (ICIC '09)
, vol.1
, pp. 11-14
-
-
Chungen Xu, X.1
Yanhong, G.2
-
23
-
-
84872471994
-
A compact encryption algorithm suited for resource-restrained WSNs
-
December
-
H. Hua. Wu, C. W. Lu, Z. Y. Liu, "A Compact Encryption Algorithm Suited for Resource-Restrained WSNs, " Journal of Information Technology Applications in Industry, pp. 849-852, December 2012.
-
(2012)
Journal of Information Technology Applications in Industry
, pp. 849-852
-
-
Hua. Wu, H.1
Lu, C.W.2
Liu, Z.Y.3
-
24
-
-
84893217985
-
RSAED: Robust and secure aggregation of encrypted data in wireless sensor networks
-
November
-
M. Boudia, O. Rafik, and F. Mohamed, "RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks, " International Journal of Network Security and Its Applications (IJNSA), Vol. 4, November 2012.
-
(2012)
International Journal of Network Security and Its Applications (IJNSA)
, vol.4
-
-
Boudia, M.1
Rafik, O.2
Mohamed, F.3
-
26
-
-
77957940949
-
Efficient and robust secure aggregation of encrypted data in sensor networks
-
Italy, July
-
J. M. Bahi, C. Guyeux, and A. Makhoul, "Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks, " Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM'10), pp. 472-477, Italy, July 2010.
-
(2010)
Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM'10)
, pp. 472-477
-
-
Bahi, J.M.1
Guyeux, C.2
Makhoul, A.3
-
28
-
-
77954086746
-
Secure encrypted-data aggregation for wireless sensor networks
-
May
-
S. I. Huang, S. Shieh, and J. D. Tygar, "Secure encrypted-data aggregation for wireless sensor networks, " Published in Journal of Wireless Networks, Vol. 6, pp. 915-927, May 2010.
-
(2010)
Published in Journal of Wireless Networks
, vol.6
, pp. 915-927
-
-
Huang, S.I.1
Shieh, S.2
Tygar, J.D.3
-
29
-
-
78049298573
-
The price of security in wireless sensor networks
-
December
-
J. Lee, K. Kapitanova, and S. H. Son, "The price of security in wireless sensor networks, " The International Journal of Computer and Telecommunications Networking, pp. 2967-2978, December 2010.
-
(2010)
The International Journal of Computer and Telecommunications Networking
, pp. 2967-2978
-
-
Lee, J.1
Kapitanova, K.2
Son, S.H.3
-
30
-
-
33646918331
-
Evaluation of security mechanisms in wireless sensor networks
-
G. Guimaraes, E. Souto, D. Sadok, and J. Kelner, "Evaluation of Security Mechanisms in Wireless Sensor Networks, " Proceedings of the Systems Communications, pp. 428-433, 2005.
-
(2005)
Proceedings of the Systems Communications
, pp. 428-433
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
32
-
-
54249097802
-
Rabbit-MAC: Lightweight authenticated encryption in wireless sensor networks
-
June
-
R. Tahir, M. Y. Javed, and A. R. Cheema, "Rabbit-MAC: Lightweight Authenticated Encryption in Wireless Sensor Networks, " International Conference on Information and Automation (ICIA'2008), pp. 573-577, June 2008.
-
(2008)
International Conference on Information and Automation (ICIA'2008)
, pp. 573-577
-
-
Tahir, R.1
Javed, M.Y.2
Cheema, A.R.3
-
33
-
-
2942590544
-
Data aggregation in wireless sensor networks-exact and approximate algorithms
-
J. Karaki, R. Mustafa, and A. Kamal, "Data aggregation in wireless sensor networks-exact and approximate algorithms, " In Proceedings of the Workshop on High Performance Switching and Routing, pp. 241-245, 2004.
-
(2004)
Proceedings of the Workshop on High Performance Switching and Routing
, pp. 241-245
-
-
Karaki, J.1
Mustafa, R.2
Kamal, A.3
-
35
-
-
57849130938
-
An elliptic threshold signature framework for k-security in wireless sensor networks
-
M. Sliti, M. Hamdi, N. Boudriga"An Elliptic Threshold Signature Framework for k-Security in Wireless Sensor Networks, " 15th IEEE ICECS,., 2008.
-
(2008)
15th IEEE ICECS
-
-
Sliti, M.1
Hamdi, M.2
Boudriga, N.3
|