Cryptography on a Speck of Dust
暂无分享,去创建一个
[1] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[2] Berk Sunar,et al. Universal Hash Functions for Emerging Ultra-Low-Power Networks , 2004 .
[3] Anantha Chandrakasan,et al. Vibration-to-electric energy conversion , 2001, IEEE Trans. Very Large Scale Integr. Syst..
[4] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[5] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[6] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[7] Christof Paar,et al. Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves , 2003, CHES.
[8] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[9] Deborah Estrin,et al. Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.
[10] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[11] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[12] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[13] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[14] Berk Sunar,et al. Energy scalable universal hashing , 2005, IEEE Transactions on Computers.