Efficiently Fuzzy Controlling with Dynamic Window in Elliptic Curve Cryptography Sensor Networks
暂无分享,去创建一个
[1] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[2] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[3] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[4] Pavan Sikka,et al. Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[5] Alfred Menezes,et al. Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.
[6] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[7] Chung-Kuo Chang,et al. An application of sensor networks for syndromic surveillance , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..
[8] Angelo C. Gilli. Binary arithmetic and Boolean algebra , 1965 .
[9] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[10] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[11] Feng Zhao. Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[12] Oscar Castillo,et al. Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, March 21-23, 2007, Hong Kong, China , 2007, IMECS.
[13] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[14] Anju Vyas. Print , 2003 .
[15] D. Stephens,et al. Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.
[16] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[17] Kiyomichi Araki,et al. Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.
[18] H. C. Williams,et al. Advances in Cryptology — CRYPTO ’85 Proceedings , 2000, Lecture Notes in Computer Science.
[19] Richard Bellman,et al. Decision-making in fuzzy environment , 2012 .
[20] Pritam Gajkumar Shah,et al. Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .
[21] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[22] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[23] Xu Huang,et al. Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.