On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks
暂无分享,去创建一个
[1] Marek Karpinski,et al. Optimal trade-off for merkle tree traversal , 2005, ICETE.
[2] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[3] G. Edward Suh,et al. Caches and hash trees for efficient memory integrity verification , 2003, The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings..
[4] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[5] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[6] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[7] Paul C. Kocher. On Certificate Revocation and Validation , 1998, Financial Cryptography.
[8] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[9] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[10] Markus Jakobsson,et al. Fractal Merkle Tree Representation and Traversal , 2003, CT-RSA.
[11] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[12] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[13] Michael Szydlo,et al. Merkle Tree Traversal in Log Space and Time , 2004, EUROCRYPT.
[14] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.