Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
A practical protocol for large group oriented networks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Hardware architectures for public key cryptography
Integration, the VLSI Journal
Minimum energy disjoint path routing in wireless ad-hoc networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Hi-index | 0.00 |
A keyless methodology to ensure secure data transmission in a network of sensors is presented. The main feature is the low power consumption due to the simplicity of the hardware that has to be implemented within each sensor. Experimental results demonstrate that the power dissipation overhead in each sensor's system is minimal when compared to key-based security methods. Experimental evidence of the security features of the presented method is also given.