-
1
-
-
84935865949
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform. Sci. 321 (2015), 263–277.
-
(2015)
Inform. Sci.
, vol.321
, pp. 263-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
2
-
-
84938212949
-
Probabilistic receiver-location privacy protection in wireless sensor networks
-
Rios, R., Cuellar, J., Lopez, J., Probabilistic receiver-location privacy protection in wireless sensor networks. Inform. Sci. 321 (2015), 205–223.
-
(2015)
Inform. Sci.
, vol.321
, pp. 205-223
-
-
Rios, R.1
Cuellar, J.2
Lopez, J.3
-
3
-
-
70349619163
-
Industrial wireless sensor networks: challenges, design principles, and technical approaches
-
Gungor, V.C., Hancke, G.P., Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56:10 (2009), 4258–4265.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.10
, pp. 4258-4265
-
-
Gungor, V.C.1
Hancke, G.P.2
-
4
-
-
84891066296
-
R3E: reliable reactive routing enhancement for wireless sensor networks
-
Niu, J., Cheng, L., Gu, Y., Shu, L., Das, S.K., R3E: reliable reactive routing enhancement for wireless sensor networks. IEEE Trans. Ind. Inf. 10:1 (2014), 784–794.
-
(2014)
IEEE Trans. Ind. Inf.
, vol.10
, Issue.1
, pp. 784-794
-
-
Niu, J.1
Cheng, L.2
Gu, Y.3
Shu, L.4
Das, S.K.5
-
5
-
-
67649560482
-
Integrating wireless sensor networks and the Internet: A security analysis
-
Roman, R., Lopez, J., Integrating wireless sensor networks and the Internet: A security analysis. Internet Res. 19:2 (2009), 246–259.
-
(2009)
Internet Res.
, vol.19
, Issue.2
, pp. 246-259
-
-
Roman, R.1
Lopez, J.2
-
6
-
-
74549125519
-
An energy-efficient access control scheme forwireless sensor networks based on elliptic curve cryptography
-
Le, X.H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., Han, M., Lee, Y.K., Lee, H., An energy-efficient access control scheme forwireless sensor networks based on elliptic curve cryptography. J. Commun. Netw. 11:6 (2009), 599–606.
-
(2009)
J. Commun. Netw.
, vol.11
, Issue.6
, pp. 599-606
-
-
Le, X.H.1
Lee, S.2
Butun, I.3
Khalid, M.4
Sankar, R.5
Kim, M.6
Han, M.7
Lee, Y.K.8
Lee, H.9
-
7
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21:2 (1978), 120–126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
8
-
-
80855130876
-
Distributed access control with privacy support in wireless sensor networks
-
He, D., Bu, J., Zhu, S., Chan, S., Chen, C., Distributed access control with privacy support in wireless sensor networks. IEEE Trans. Wireless Commun. 10:10 (2011), 3472–3481.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3472-3481
-
-
He, D.1
Bu, J.2
Zhu, S.3
Chan, S.4
Chen, C.5
-
9
-
-
84946833891
-
How to leak a secret
-
Springer-Verlag
-
Rivest, R.L., Shamir, A., Tauman, Y., How to leak a secret. Proc. Advances in Cryptology-ASIACRYPT 2001 LNCS, vol. 2248, 2001, Springer-Verlag, 552–565.
-
(2001)
Proc. Advances in Cryptology-ASIACRYPT 2001, LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
10
-
-
84890338882
-
Linkable ring signature with unconditional anonymity
-
Liu, J.K., Au, M.H., Susilo, W., Zhou, J., Linkable ring signature with unconditional anonymity. IEEE Trans. Knowl. Data Eng. 26:1 (2014), 157–165.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.1
, pp. 157-165
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
Zhou, J.4
-
11
-
-
79952071204
-
FDAC: toward fine-grained distributed data access control in wireless sensor networks
-
Yu, S., Ren, K., Lou, W., FDAC: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22:4 (2011), 673–686.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.4
, pp. 673-686
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
12
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: Proc. ACM Conference on Computer and Communications Security–CCS'06, 2006, pp. 89–98.
-
(2006)
Proc. ACM Conference on Computer and Communications Security–CCS'06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
79959506807
-
Fine-grained data access control for distributed sensor networks
-
Hur, J., Fine-grained data access control for distributed sensor networks. Wirel. Netw. 17:5 (2011), 1235–1249.
-
(2011)
Wirel. Netw.
, vol.17
, Issue.5
, pp. 1235-1249
-
-
Hur, J.1
-
14
-
-
84863522640
-
Distributed privacy-preserving access control in sensor networks
-
Zhang, R., Zhang, Y., Ren, K., Distributed privacy-preserving access control in sensor networks. IEEE Trans. Parallel Distrib. Syst. 23:8 (2012), 1427–1438.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1427-1438
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
-
15
-
-
84878920667
-
Enabling end-to-end secure communication between wireless sensor networks and the Internet
-
Yu, H., He, J., Zhang, T., Xiao, P., Zhang, Y., Enabling end-to-end secure communication between wireless sensor networks and the Internet. World Wide Web 16:4 (2013), 515–540.
-
(2013)
World Wide Web
, vol.16
, Issue.4
, pp. 515-540
-
-
Yu, H.1
He, J.2
Zhang, T.3
Xiao, P.4
Zhang, Y.5
-
16
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption)
-
Springer-Verlag
-
Zheng, Y., Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption). Proc. Advances in Cryptology-CRYPTO'97 LNCS, vol. 1294, 1997, Springer-Verlag, 165–179.
-
(1997)
Proc. Advances in Cryptology-CRYPTO'97, LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
17
-
-
84880570801
-
Efficient signcryption for heterogeneous systems
-
Li, F., Zhang, H., Takagi, T., Efficient signcryption for heterogeneous systems. IEEE Syst. J. 7:3 (2013), 420–429.
-
(2013)
IEEE Syst. J.
, vol.7
, Issue.3
, pp. 420-429
-
-
Li, F.1
Zhang, H.2
Takagi, T.3
-
18
-
-
84896506672
-
Distributed access control with adaptive privacy preserving property for wireless sensor networks
-
Ma, C., Xue, K., Hong, P., Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur. Commun. Netw. 7:4 (2014), 759–773.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.4
, pp. 759-773
-
-
Ma, C.1
Xue, K.2
Hong, P.3
-
19
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D., Franklin, M., Identity-based encryption from the weil pairing. SIAM J. Comput. 32:3 (2003), 586–615.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
20
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
Ren, K., Lou, W., Zeng, K., Moran, P.J., On broadcast authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 6:11 (2007), 4136–4144.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
21
-
-
84861445209
-
SDRP: a secure and distributed reprogramming protocol for wireless sensor networks
-
He, D., Chen, C., Chan, S., Bu, J., SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 59:11 (2012), 4155–4163.
-
(2012)
IEEE Trans. Ind. Electron.
, vol.59
, Issue.11
, pp. 4155-4163
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
22
-
-
84871070974
-
Practical identity-based signature for wireless sensor networks
-
Li, F., Zhong, D., Takagi, T., Practical identity-based signature for wireless sensor networks. IEEE Wirel. Commun. Lett. 1:6 (2012), 637–640.
-
(2012)
IEEE Wirel. Commun. Lett.
, vol.1
, Issue.6
, pp. 637-640
-
-
Li, F.1
Zhong, D.2
Takagi, T.3
-
23
-
-
84894526330
-
Secure and efficient data transmission for cluster-based wireless sensor networks
-
Lu, H., Li, J., Guizani, M., Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25:3 (2014), 750–761.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.3
, pp. 750-761
-
-
Lu, H.1
Li, J.2
Guizani, M.3
-
24
-
-
84883394343
-
Practical secure communication for integrating wireless sensor networks into the Internet of things
-
Li, F., Xiong, P., Practical secure communication for integrating wireless sensor networks into the Internet of things. IEEE Sens. J. 13:10 (2013), 3677–3684.
-
(2013)
IEEE Sens. J.
, vol.13
, Issue.10
, pp. 3677-3684
-
-
Li, F.1
Xiong, P.2
-
25
-
-
84880413059
-
Enforcing security mechanisms in the IP-based Internet of things: An algorithmic overview
-
Cirani, S., Ferrari, G., Veltri, L., Enforcing security mechanisms in the IP-based Internet of things: An algorithmic overview. Algorithms 6:2 (2013), 197–226.
-
(2013)
Algorithms
, vol.6
, Issue.2
, pp. 197-226
-
-
Cirani, S.1
Ferrari, G.2
Veltri, L.3
-
26
-
-
84916934620
-
IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios
-
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G., IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15:2 (2014), 1224–1234.
-
(2014)
IEEE Sens. J.
, vol.15
, Issue.2
, pp. 1224-1234
-
-
Cirani, S.1
Picone, M.2
Gonizzi, P.3
Veltri, L.4
Ferrari, G.5
-
27
-
-
77958082044
-
Toward efficient certificateless signcryption from (and without) bilinear pairings
-
P.S.L.M. Barreto, A.M. Deusajute, E.S. Cruz, G.C.F. Pereira, R.R. Silva, Toward efficient certificateless signcryption from (and without) bilinear pairings, in: Proc. Brazilian Symposium on Information and Computer System Security, 2008, pp. 115–125.
-
(2008)
Proc. Brazilian Symposium on Information and Computer System Security
, pp. 115-125
-
-
Barreto, P.S.L.M.1
Deusajute, A.M.2
Cruz, E.S.3
Pereira, G.C.F.4
Silva, R.R.5
-
28
-
-
0345490607
-
Certificateless public key cryptography
-
Springer-Verlag
-
Al-Riyami, S.S., Paterson, K.G., Certificateless public key cryptography. Proc. Advances in Cryptology-ASIACRYPT 2003 LNCS, vol. 2894, 2003, Springer-Verlag, 452–474.
-
(2003)
Proc. Advances in Cryptology-ASIACRYPT 2003, LNCS
, vol.2894
, pp. 452-474
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
29
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Springer-Verlag
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.J., Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Proc. Advances in Cryptology-ASIACRYPT 2005 LNCS, vol. 3788, 2005, Springer-Verlag, 515–532.
-
(2005)
Proc. Advances in Cryptology-ASIACRYPT 2005, LNCS
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.J.4
-
30
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P., Efficient signature generation by smart cards. J. Cryptol. 4:3 (1991), 161–174.
-
(1991)
J. Cryptol.
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
31
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
Springer-Verlag
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P., Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. Proc. Information Security and Cryptology-ICISC 2003 LNCS, vol. 2971, 2004, Springer-Verlag, 352–369.
-
(2004)
Proc. Information Security and Cryptology-ICISC 2003, LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
32
-
-
84947237328
-
On the security of joint signature and encryption
-
Springer-Verlag
-
An, J.H., Dodis, Y., Rabin, T., On the security of joint signature and encryption. Proc. Advances in Cryptology-EUROCRYPT 2002 LNCS, vol. 2332, 2002, Springer-Verlag, 83–107.
-
(2002)
Proc. Advances in Cryptology-EUROCRYPT 2002, LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
33
-
-
35048817852
-
Encrypted message authentication by firewalls
-
Springer-Verlag
-
Gamage, C., Leiwo, J., Zheng, Y., Encrypted message authentication by firewalls. Proc. Public Key Cryptography-PKC'99 LNCS, vol. 1560, 1999, Springer-Verlag, 69–81.
-
(1999)
Proc. Public Key Cryptography-PKC'99, LNCS
, vol.1560
, pp. 69-81
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
34
-
-
4644332974
-
Signcryption schemes with forward secrecy
-
H.Y. Jung, D.H. Lee, J.I. Lim, K.S. Chang, Signcryption schemes with forward secrecy, in: Proc. Information Security Applications-WISA 2001, 2001, pp. 403–475.
-
(2001)
Proc. Information Security Applications-WISA
, vol.2001
, pp. 403-475
-
-
Jung, H.Y.1
Lee, D.H.2
Lim, J.I.3
Chang, K.S.4
-
35
-
-
0003753233
-
The Design of Rijndael: AES-the Advanced Encryption Standard
-
Springer
-
Daemen, J., Rijmen, V., The Design of Rijndael: AES-the Advanced Encryption Standard. 2002, Springer.
-
(2002)
-
-
Daemen, J.1
Rijmen, V.2
-
36
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Johnson, D., Menezes, A., Vanstone, S., The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1:1 (2001), 36–63.
-
(2001)
Int. J. Inf. Secur.
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
37
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Springer-Verlag
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C., Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Proc. Cryptographic Hardware and Embedded Systems-CHES 2004 LNCS, vol. 3156, 2004, Springer-Verlag, 119–132.
-
(2004)
Proc. Cryptographic Hardware and Embedded Systems-CHES 2004, LNCS
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
38
-
-
84870065829
-
EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
-
Shim, K.A., Lee, Y.R., Park, C.M., EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks 11:1 (2013), 182–189.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.1
, pp. 182-189
-
-
Shim, K.A.1
Lee, Y.R.2
Park, C.M.3
-
39
-
-
39049094066
-
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
-
Cao, X., Kou, W., Dang, L., Zhao, B., IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Comput. Commun. 31:4 (2008), 659–667.
-
(2008)
Comput. Commun.
, vol.31
, Issue.4
, pp. 659-667
-
-
Cao, X.1
Kou, W.2
Dang, L.3
Zhao, B.4
-
40
-
-
84901244949
-
2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks
-
2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Networks 19 (2014), 1–8.
-
(2014)
Ad Hoc Networks
, vol.19
, pp. 1-8
-
-
Shim, K.A.1
|