메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Achieving energy efficient and secure communication in wireless sensor networks

Author keywords

Cryptography; Energy efficient; Identity based encryption; Wireless sensor networks

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; DATA COMPRESSION; ELECTRIC POWER UTILIZATION; OPTIMIZATION; SECURITY OF DATA;

EID: 85088053939     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/wocn.2006.1666571     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 4
    • 0021468777 scopus 로고
    • Fast evolution of algorithms in fields of characteristic rwo
    • D. Coppersmith, "Fast evolution of algorithms in fields of characteristic rwo", IEEE Transactions on Information Theory, 30 (1984), 587-594.
    • (1984) IEEE Transactions on Information Theory , vol.30 , pp. 587-594
    • Coppersmith, D.1
  • 7
    • 0000211152 scopus 로고
    • A Theory of Factorization and Genera
    • D. Shanks. A Theory of Factorization and Genera. In Proc. Symp. Pure Math., 20:415-440, 1971.
    • (1971) Proc. Symp. Pure Math , vol.20 , pp. 415-440
    • Shanks, D.1
  • 9
    • 84941611264 scopus 로고
    • On the analogue of the division polynomials for hyperelliptic curves
    • D. G. Cantor. On the analogue of the division polynomials for hyperelliptic curves. J. Reine Angew. Math., 447:91-145, 1994.
    • (1994) J. Reine Angew. Math , vol.447 , pp. 91-145
    • Cantor, D.G.1
  • 10
    • 34249336679 scopus 로고    scopus 로고
    • Jacobians in NTL
    • P. Gaudry. NTLJac2, Tools for genus 2 Jacobians in NTL. http://www.lix.polytechnique.frLabo/Pierrick.Gaudry/NTLJac2/.
    • NTLJac2, Tools for genus , vol.2
    • Gaudry, P.1
  • 11
    • 4243082091 scopus 로고    scopus 로고
    • A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM47(6):53-57, 2004.
    • A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM47(6):53-57, 2004.
  • 13
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Advances in Cryptology, ASIACRYPT of, Full version available at
    • S. AlRiyami and K.G. Paterson. Certificateless public key cryptography. In Advances in Cryptology - ASIACRYPT 2003, vol. 2894 of LNCS, pp. 452-473, 2003. Full version available at http://eprint.iacr.org/.
    • (2003) LNCS , vol.2894 , pp. 452-473
    • AlRiyami, S.1    Paterson, K.G.2
  • 14
    • 0037623983 scopus 로고    scopus 로고
    • D. Boneh and M. Franklin. Identity-Based encryption from theWeil pairing. SIAM Journal of Computing, 32(3):586-615, 2003. This is the full version of an extended abstract of the same title presented at Crypto'01.
    • D. Boneh and M. Franklin. Identity-Based encryption from theWeil pairing. SIAM Journal of Computing, 32(3):586-615, 2003. This is the full version of an extended abstract of the same title presented at Crypto'01.
  • 15
    • 77950151506 scopus 로고    scopus 로고
    • An Identity Based Encryption Scheme Based on Quadratic Residues
    • Proceedings of the 8th IMA International Conference on Cryptography and Coding, Springer-Verlag
    • C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260, pages 360-363, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 16
    • 35048835319 scopus 로고    scopus 로고
    • Secure Identity Based Encryption Without Random Oracles, extended
    • abstract in Proceedings of CRYPTO '04, Springer-Verlag, Full paper available in the IACR eprint archives
    • D. Boneh and X. Boyen, Secure Identity Based Encryption Without Random Oracles, extended abstract in Proceedings of CRYPTO '04, LNCS 3152, Springer-Verlag, 2004. Full paper available in the IACR eprint archives, 〈http://eprint.iacr.org/2004/173/〉.
    • (2004) LNCS , vol.3152
    • Boneh, D.1    Boyen, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.