Low-Cost Standard Public Key Cryptography Services for Wireless IoT Systems
暂无分享,去创建一个
[1] Daniel J. Bernstein. Multi-user Schnorr security, revisited , 2015, IACR Cryptol. ePrint Arch..
[2] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[3] Craig Costello,et al. Fourℚ: Four-Dimensional Decompositions on a ℚ-curve over the Mersenne Prime , 2015, ASIACRYPT.
[4] Attila A. Yavuz,et al. HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[5] Sorin-Aurel Moraru,et al. Signal conditioning techniques for health monitoring devices , 2012, 2012 35th International Conference on Telecommunications and Signal Processing (TSP).
[6] Chiara Petrioli,et al. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? , 2013, NDSS.
[7] T. Okamoto,et al. PSEC{3: Provably Secure Elliptic Curve Encryption Scheme { V3 (Submission to P1363a) , 2000 .
[8] Steven D. Galbraith,et al. Public key signatures in the multi-user setting , 2002, Inf. Process. Lett..
[9] Christof Paar,et al. Comparison of innovative signature algorithms for WSNs , 2008, WiSec '08.
[10] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[11] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[12] Peng Ning,et al. BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems , 2009, 2009 Annual Computer Security Applications Conference.
[13] Markus Ullmann,et al. Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme , 2011, WiSec '11.
[14] Ramarathnam Venkatesan,et al. Speeding up Discrete Log and Factoring Based Schemes via Precomputations , 1998, EUROCRYPT.
[15] L. Perniu,et al. Pulse oximeter based monitoring system for people at risk , 2012, 2012 IEEE 13th International Symposium on Computational Intelligence and Informatics (CINTI).
[16] Hairong Qi,et al. Self-certified group key generation for ad hoc clusters in wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..