Go to content
UR Home

Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter and Wenzl, Jürgen (2012) Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography. In: Obaidat, M.S. and Sevillano, J.L. and Filipe, J., (eds.) E-Business and Telecommunications : ICETE 2011 , Seville, Spain, July 18-21. Communications in Computer and Information Science, 314. Springer, Berlin, pp. 74-81. ISBN 978-3-642-35755-8.

Full text not available from this repository.

Other URL: http://www.springer.com/computer/communication+networks/book/978-3-642-35754-1


Wireless sensor networks consist of a huge number of small nodes, communicating wirelessly, to transmit any sort of measured data, like temperature, radiation, etc. At the air interface, unprotected messages can be easily intercepted and modified by an attacker. Traditionally, symmetric cryptography is deployed in sensor networks, due to the nodes being constrained in terms of energy, processing ...


Export bibliographical data

Item type:Book section
Institutions:Business, Economics and Information Systems > Institut für Wirtschaftsinformatik > Alumni or Retired Professors > Professur für Wirtschaftsinformatik & Wirtschaftsmathematik (Prof. Dr. Peter Lory)
Keywords:Sensor networks, Threshold cryptography, Efficient implementation, Multiparty multiplication protocol of Gennaro, Rabin, and Rabin.
Dewey Decimal Classification:000 Computer science, information & general works > 000 Generalities, Science
000 Computer science, information & general works > 004 Computer science
Refereed:Yes, this version has been refereed
Created at the University of Regensburg:Partially
Item ID:27204
Owner only: item control page
  1. Homepage UR

University Library

Publication Server


Publishing: oa@ur.de

Dissertations: dissertationen@ur.de

Research data: daten@ur.de

Contact persons