Feasibility of PKC in resource-constrained wireless sensor networks
暂无分享,去创建一个
[1] Rajeevan Amirtharajah,et al. Self-powered signal processing using vibration-based power generation , 1998, IEEE J. Solid State Circuits.
[2] Joseph H. Silverman,et al. Optimizations for NTRU , 2001 .
[3] Aziz Mohaisen,et al. Cooperative Public Key Authentication Protocol in Wireless Sensor Network , 2006, UIC.
[4] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[5] Chieh-Yih Wan,et al. Intel Mote 2: an advanced platform for demanding sensor network applications , 2005, SenSys '05.
[6] Cristina Alcaraz,et al. Applicability of Public Key Infrastructures in Wireless Sensor Networks , 2007, EuroPKI.
[7] A. Kansal,et al. An environmental energy harvesting framework for sensor networks , 2003, Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003. ISLPED '03..
[8] Cormac J. Sreenan,et al. The development of a novel minaturized modular platform for wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[9] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[10] Zhong Chen,et al. C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[11] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[12] K. Delaney,et al. THE DEVELOPMENT OF A NOVEL MINIATURISED MODULAR PLATFORM FOR WIRELESS SENSOR NETWORKS , 2004 .
[13] Guido Bertoni,et al. Power aware design of an elliptic curve coprocessor for 8 bit platforms , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[14] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[15] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[16] Chen-Mou Cheng,et al. Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.
[17] Rachit Agarwal,et al. Hardware - Software Implementation of Public-Key Cryptography for Wireless Sensor Networks , 2006 .
[18] I. Elhanany,et al. Self-certified public key generation on the intel mote 2 sensor network platform , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.
[19] Martina Zitterbart,et al. Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.
[20] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[21] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[22] Osman Ugus. Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS , 2007 .
[23] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[24] Johann Großschädl,et al. The energy cost of cryptographic key establishment in wireless sensor networks , 2007, ASIACCS '07.
[25] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[26] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[27] Bo-Yin Yang,et al. Tame Transformation Signatures With Topsy-Turvy Hashes , .
[28] Hairong Qi,et al. Revisiting Public-Key Cryptography for Wireless Sensor Networks , 2005, Computer.
[29] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[30] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[31] Mani B. Srivastava,et al. Performance aware tasking for environmentally powered sensor networks , 2004, SIGMETRICS '04/Performance '04.
[32] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[33] Vipul Gupta,et al. Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper) , 2005, PerCom.
[34] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.