Public key cryptography in resource-constrained WSN
暂无分享,去创建一个
[1] Bo-Yin Yang,et al. Tame Transformation Signatures With Topsy-Turvy Hashes , .
[2] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[3] Cristina Alcaraz,et al. Applicability of Public Key Infrastructures in Wireless Sensor Networks , 2007, EuroPKI.
[4] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[5] Chieh-Yih Wan,et al. Intel Mote 2: an advanced platform for demanding sensor network applications , 2005, SenSys '05.
[6] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[7] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[8] Chen-Mou Cheng,et al. Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.
[9] I. Elhanany,et al. Self-certified public key generation on the intel mote 2 sensor network platform , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.
[10] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[11] Martina Zitterbart,et al. Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.
[12] Johann Großschädl,et al. The energy cost of cryptographic key establishment in wireless sensor networks , 2007, ASIACCS '07.
[13] Rachit Agarwal,et al. Hardware - Software Implementation of Public-Key Cryptography for Wireless Sensor Networks , 2006 .
[14] Osman Ugus. Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS , 2007 .
[15] Zhong Chen,et al. C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[16] Guido Bertoni,et al. Power aware design of an elliptic curve coprocessor for 8 bit platforms , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[17] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[18] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[19] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[20] Rajeevan Amirtharajah,et al. Self-powered signal processing using vibration-based power generation , 1998, IEEE J. Solid State Circuits.
[21] Joseph H. Silverman,et al. Optimizations for NTRU , 2001 .
[22] Aziz Mohaisen,et al. Cooperative Public Key Authentication Protocol in Wireless Sensor Network , 2006, UIC.
[23] A. Kansal,et al. An environmental energy harvesting framework for sensor networks , 2003, Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003. ISLPED '03..
[24] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[25] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[26] K. Delaney,et al. THE DEVELOPMENT OF A NOVEL MINIATURISED MODULAR PLATFORM FOR WIRELESS SENSOR NETWORKS , 2004 .
[27] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[28] Mani B. Srivastava,et al. Performance aware tasking for environmentally powered sensor networks , 2004, SIGMETRICS '04/Performance '04.