scispace - formally typeset
Open Access

Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85

About
The article was published on 1986-06-01 and is currently open access. It has received 40 citations till now.

read more

Citations
More filters
Book

Robust and Optimal Control

TL;DR: This paper reviewed the history of the relationship between robust control and optimal control and H-infinity theory and concluded that robust control has become thoroughly mainstream, and robust control methods permeate robust control theory.
Journal ArticleDOI

A survey of security issues in wireless sensor networks

TL;DR: This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
Journal ArticleDOI

Measurement and analysis of brain deformation during neurosurgery

TL;DR: It is quantitatively demonstrated that brain deformation occurs not only at the surface, but also in deeper brain structure, and that the principal direction of displacement does not always correspond with the direction of gravity.
Journal ArticleDOI

Implementing public-key infrastructure for sensor networks

TL;DR: A critical evaluation of the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote is presented, demonstrating that public keys can be generated within 34 seconds and that shared secrets can be distributed among nodes in a sensor network within the same time.
Proceedings ArticleDOI

Establishing and protecting digital identity in federation systems

TL;DR: A novel solution for protection against identity theft of these identity attributes and a precursor to new and innovative cryptographic techniques which can provide solutions for the security and privacy problems in federated identity management are developed.
References
More filters
Book

Robust and Optimal Control

TL;DR: This paper reviewed the history of the relationship between robust control and optimal control and H-infinity theory and concluded that robust control has become thoroughly mainstream, and robust control methods permeate robust control theory.
Journal ArticleDOI

A survey of security issues in wireless sensor networks

TL;DR: This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
Journal ArticleDOI

Measurement and analysis of brain deformation during neurosurgery

TL;DR: It is quantitatively demonstrated that brain deformation occurs not only at the surface, but also in deeper brain structure, and that the principal direction of displacement does not always correspond with the direction of gravity.
Journal ArticleDOI

Implementing public-key infrastructure for sensor networks

TL;DR: A critical evaluation of the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote is presented, demonstrating that public keys can be generated within 34 seconds and that shared secrets can be distributed among nodes in a sensor network within the same time.
Proceedings ArticleDOI

Establishing and protecting digital identity in federation systems

TL;DR: A novel solution for protection against identity theft of these identity attributes and a precursor to new and innovative cryptographic techniques which can provide solutions for the security and privacy problems in federated identity management are developed.