ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
36
views
33
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,574
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Wireless Sensor Networks
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
other
Author(s):
Piotr Szczechowiak
,
Leonardo B. Oliveira
,
Michael Scott
,
Martin Collier
,
Ricardo Dahab
Publication date
(Print):
2008
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
HIV Self-Testing
Most cited references
33
Record
: found
Abstract
: not found
Article
: not found
Wireless sensor networks: a survey
I.F. Akyildiz
,
Xiaowei Su
,
Y. Sankarasubramaniam
…
(2002)
0
comments
Cited
1028
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Use of Elliptic Curves in Cryptography
Victor S. Miller
(1986)
0
comments
Cited
179
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Denial of service in sensor networks
A.D. Wood
,
J.A. Stankovic
(2002)
0
comments
Cited
142
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Pages
: 305-320
DOI:
10.1007/978-3-540-77690-1_19
SO-VID:
99e506d7-c6fe-4d31-af36-f236923a6ede
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 17
Activity Recognition from On-Body Sensors: Accuracy-Power Trade-Off by Dynamic Sensor Selection
pp. 90
Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks
pp. 305
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
Similar content
2,574
Divertible protocols and atomic proxy cryptography
Authors:
Blaze
,
M BLAZE
,
G Bleumer
…
On the impossibility of approximate obfuscation and applications to resettable cryptography
Authors:
Nir Bitansky
,
Omer Paneth
Analysis of Efficient Implementation of Elliptic Curve Cryptography Architecture for Resource Constraint Application
Authors:
Kirit V. Patel
,
Dr. Shah
See all similar
Cited by
15
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
Authors:
Sravani Challa
,
Mohammad Wazid
,
Ashok Das
…
IoT Middleware: A Survey on Issues and Enabling technologies
Authors:
Anne H. H. Ngu
,
Mario F Gutiérrez
,
Vangelis Metsis
…
Toward a Lightweight Authentication and Authorization Framework for Smart Objects
Authors:
Antonio Jara
,
Antonio Skarmeta
,
Latif Ladid
…
See all cited by