Back to Results
First PageMeta Content
Security / Applied mathematics / Signcryption / Digital signature / Cipher / Elliptic curve cryptography / ID-based encryption / Cryptography / Public-key cryptography / Cyberwarfare


1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning
Add to Reading List

Document Date: 2011-11-09 13:26:12


Open Document

File Size: 245,99 KB

Share Result on Facebook

City

Washington / DC / Hash / Berlin / Cambridge / New York / /

Company

G. kG / SIAM Journal / Distributed Systems / Unattended Wireless Sensor Networks / Trident Systems / Reliable Distributed Systems / /

Country

United States / /

/

Facility

Computer Science North Carolina State University / /

Holiday

Assumption / /

IndustryTerm

nuclear/chemical activities / ubiquitous systems / continuous endto-end real-time communication / communications security / cryptographic tools / sensor networks / non-real-time nature / adaptive ad-hoc network security protocol / Wireless Sensor Network / wireless sensor networks / broadcast authentication protocol / continuous real-time communication / sensor network / /

MarketIndex

TA / /

Organization

HaSAFSS ECC / U.S. Defense Advanced Research Projects Agency / Trusted Third Party / Information Processing Technology Office / Mobile Tactical Center / Peng Ning Department of Computer Science North Carolina State University Raleigh / /

Person

Attila Altay Yavuz / Secure Signatures / /

Position

representative / Forward / /

Product

Franklin / /

ProgrammingLanguage

BASIC / EC / /

PublishedMedium

SIAM Journal on Computing / Journal of Cryptology / /

Technology

Encryption / Cryptography / adaptive ad-hoc network security protocol / anonymous timed-release encryption / Public Key / broadcast authentication protocol / Identity-based encryption / http / secret key / digital signature / pdf / /

URL

www.tridsys.com/white-unattended-ground-sensors.htm / http /

SocialTag