An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
暂无分享,去创建一个
Choong Seon Hong | Eui-nam Huh | Al-Sakib Khan Pathan | Md. Mokammel Haque | A. Pathan | C. Hong | M. Haque | E. Huh
[1] Cristina Alcaraz,et al. Applicability of Public Key Infrastructures in Wireless Sensor Networks , 2007, EuroPKI.
[2] Rachit Agarwal,et al. Hardware - Software Implementation of Public-Key Cryptography for Wireless Sensor Networks , 2006 .
[3] Osman Ugus. Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS , 2007 .
[4] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[5] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[6] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[7] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[8] Adi Ben-Israel,et al. Generalized inverses: theory and applications , 1974 .
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Patrick L. Odell,et al. Generalized Inverse Matrices , 1971 .
[11] S. R. Searle. Generalized Inverse Matrices , 1971 .
[12] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[13] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[14] Aziz Mohaisen,et al. Cooperative Public Key Authentication Protocol in Wireless Sensor Network , 2006, UIC.
[15] Martina Zitterbart,et al. Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.
[16] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[17] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[18] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[19] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[20] Guido Bertoni,et al. Power aware design of an elliptic curve coprocessor for 8 bit platforms , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[21] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[22] KyungHi Chang,et al. A Linear Precoding Technique for OFDM Systems with Cyclic Delay Diversity , 2008, KSII Trans. Internet Inf. Syst..
[23] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[24] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[25] Zhong Chen,et al. C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.