Vibration-to-electric energy conversion
IEEE Transactions on Very Large Scale Integration (VLSI) Systems - Special issue on low power electronics and design
SPINS: security protocols for sensor networks
Wireless Networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Energy Scalable Universal Hashing
IEEE Transactions on Computers
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Mobile Networks and Applications
Unclonable Lightweight Authentication Scheme
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Journal of Systems Architecture: the EUROMICRO Journal
Anonymous mutual authentication protocol for RFID tag without back-end database
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Energy-Efficient cryptographic engineering paradigm
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Hi-index | 4.10 |
As tiny wireless sensors and RFID tags become ubiquitous, they impact privacy, trust, and control. Protecting data on these devices requires new algorithms suitable for ultralow-power implementations.