On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[2] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[3] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[4] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[5] Georgios Kambourakis,et al. Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems , 2004, EURASIP J. Wirel. Commun. Netw..
[6] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.
[7] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[8] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[9] John Daniels,et al. Java™ on the bare metal of wireless sensor devices: the squawk Java virtual machine , 2006, VEE '06.
[10] David E. Culler,et al. The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.
[11] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[12] Elfed Lewis,et al. Efficiently securing data on a wireless sensor network , 2007 .
[13] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[14] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[15] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[16] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[17] Carlos F. García-Hernández,et al. Wireless Sensor Networks and Applications: a Survey , 2007 .
[18] Sanjay Kumar Madria,et al. Sensor networks: an overview , 2003 .
[19] Vipul Gupta,et al. Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper) , 2005, PerCom.
[20] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[21] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[22] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[23] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[24] Andreas Klein,et al. Attacks on the RC4 stream cipher , 2008, Des. Codes Cryptogr..