Cryptography Reference
In-Depth Information
Appendix—For
Further Reading
Aranha, D. F., C. Gouvêa, J. López, L. B. Oliveira, M. Scott, and R. Dahab. TinyPBC (soft-
ware). Fully Enabling PKC in SensorNets. 2010. https://sites.google.com/site/tinypbc/
Blake, I. F., G. Seroussi, and N. P. Smart. Advances in Elliptic Curve Cryptography. Cambridge
University Press, n.d.
Chatterjee, S., and P. Sarkar. Identity-Based Encryption. Springer, 2011.
Gunasekaran, R., and H. Qi. XLRP: Cross Layer Routing Protocol for Wireless Sensor
Networks. Wireless Communications and Networking Conference (WCNC). IEEE, 2008,
2135 -2140.
Joye, M., and G. Neven. Identity-Based Cryptography. IOS Press, 2009.
Kuorilehto, M., M. Kohvakka, J. Suhonen, P. Hämäläinen, M. Hännikäinen, and T. D.
Hämäläinen. Ultra-Low Energy Wireless Sensor Networks in Practice - Theory, Realization and
Deployment. John Wiley & Sons Ltd, 2007.
Lidl, R., and H. Niederreiter. Introduction to Finite Fields and Their Applications. Cambridge
University Press, 1986.
Martin, L. Introduction to Identity-Based Encryption. Artech House, 2008.
Menezes, A. J., P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography.
CRC Press, 2001.
Muralidharan, G. On the distributed revocation of nodes in sensor networks. Master's thesis.
College Park: University of Maryland, 2004.
Ren, K., S. Yu, W. Lou, and Y. Zhang. IEEE Transactions on Vehicular Technology (IEEE) 58,
no. 8 (2009): 4554-4564.
Rosen, K. H., editor. Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press,
2006.
Silverman, J. H. The Arithmetic of Elliptic Curves. 2nd ed. Springer-Verlag, 2009.
Srivastava, V., and M. Motani. Cross-layer design: a survey and the road ahead. Communications
Magazine (IEEE) 43, no. 12 (2005): 112-119.
Szczechowiak, P., and M. Collier. TinyIBE: Identity-based encryption for heterogeneous sensor
networks. International Conference on Intelligent Sensors, Sensor Networks and Information
Processing. IEEE, 2009, 349-354.
203
 
 
Search WWH ::




Custom Search