Cryptography Reference
In-Depth Information
Tian, X., D. Wong, and R. Zhu. Analysis and improvement of an authenticated key exchange
protocol for sensor networks. Communications Letters (IEEE) 9, no. 11 (2005): 970-972.
Wander, A. S., N. Gura, H. Eberle, V. Gupta, and S. C. Shantz. Energy analysis of public-key
cryptography for wireless sensor networks. Third IEEE International Conference on Pervasive
Computing and Communications. IEEE, 2005, 324-328.
Watro, R., D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. TinyPK: Securing sensor
networks with public key technology. 2nd ACM Workshop on Security of Ad Hoc and Sensor
Networks. ACM, 2004, 59-64.
Search WWH ::




Custom Search