Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node
暂无分享,去创建一个
[1] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[2] Chiara Petrioli,et al. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? , 2013, NDSS.
[3] Mani B. Srivastava,et al. Design considerations for solar energy harvesting wireless embedded systems , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[4] Khaled Elleithy,et al. Innovations and Advances in Computer, Information, Systems Sciences, and Engineering , 2013 .
[5] Julien Penders,et al. Energy Harvesting for Autonomous Wireless Sensor Networks , 2010, IEEE Solid-State Circuits Magazine.
[6] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[7] Christof Paar,et al. Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures , 2013, RFIDSec.
[8] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[9] Paul K. Wright,et al. Vibration Powered Battery-Assisted Passive RFID Tag , 2005, EUC Workshops.
[10] Norbert Felber,et al. Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices , 2010, WISA.
[11] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[12] Nigel P. Smart,et al. Hash Based Digital Signature Schemes , 2005, IMACC.
[13] Timothy C. Green,et al. Energy Harvesting From Human and Machine Motion for Wireless Electronic Devices , 2008, Proceedings of the IEEE.
[14] Christof Paar,et al. Fast Hash-Based Signatures on Constrained Devices , 2008, CARDIS.
[15] Ricardo Dahab,et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.
[16] Michael Hutter,et al. Elliptic Curve Cryptography on the WISP UHF RFID Tag , 2011, RFIDSec.
[17] Dan Komosny,et al. Energy Efficient Public Key Cryptography in Wireless Sensor Networks , 2013 .
[18] Dong Sam Ha,et al. A self-powered power management circuit for energy harvested by a piezoelectric cantilever , 2010, 2010 Twenty-Fifth Annual IEEE Applied Power Electronics Conference and Exposition (APEC).
[19] Patrick Schaumont,et al. Energy-Architecture Tuning for ECC-Based RFID Tags , 2013, RFIDSec.
[20] Kevin Fu,et al. Mementos: system support for long-running computation on RFID-scale devices , 2011, ASPLOS XVI.
[21] Johannes Buchmann,et al. Hash-based Digital Signature Schemes , 2009 .
[22] Erich Wenger,et al. Evaluating 16-Bit Processors for Elliptic Curve Cryptography , 2011, CARDIS.
[23] David Wetherall,et al. Dewdrop: An Energy-Aware Runtime for Computational RFID , 2011, NSDI.