An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks
暂无分享,去创建一个
[1] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[2] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[3] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[4] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[5] Scott A. Vanstone,et al. Elliptic curve cryptosystems using curves of smooth order over the ring Zn , 1997, IEEE Trans. Inf. Theory.
[6] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[7] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[8] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[9] Mark Weiser,et al. Some Computer Science Problems in Ubiquitous Computing , 1993 .
[10] Tzer-Shyong Chen,et al. An efficient threshold group signature scheme , 2004 .
[11] Aggelos Kiayias,et al. Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[14] Alfred Menezes,et al. Elliptic Curves and Cryptography , 1999 .
[15] Tzer-Shyong Chen,et al. An efficient threshold group signature scheme , 2004, 2004 IEEE Region 10 Conference TENCON 2004..
[16] Brent Waters,et al. Strongly Unforgeable Signatures Based on Computational Diffie-Hellman , 2006, Public Key Cryptography.