• Publications
  • Influence
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
Text-based passwords remain the dominant authentication method in computer systems, despite significant advancement in attackers' capabilities to perform password cracking. In response to thisExpand
  • 359
  • 28
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience andExpand
  • 229
  • 22
YCSB++: benchmarking and performance debugging advanced features in scalable table stores
Inspired by Google's BigTable, a variety of scalable, semi-structured, weak-semantic table stores have been developed and optimized for different priorities such as query speed, ingest speed,Expand
  • 173
  • 9
Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller
In this work, we describe a software implementation of elliptic curve cryptography and pairing-based cryptography for the MSP430 microcontroller family, which is used in wireless sensors. DigitalExpand
  • 45
  • 7
Efficient implementation of elliptic curve cryptography in wireless sensors
The deployment of cryptography in sensor networks is a challenging task, given the limited computational power and the resource-constrained nature of the sensoring devices. This paper presents theExpand
  • 55
  • 6
TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes
After a few years of intense research, wireless sensor networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled aExpand
  • 109
  • 4
TinyTate: Identity-Based Encryption for Sensor Networks
In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent ofExpand
  • 32
  • 4
Identity-Based Encryption for Sensor Networks
In spite of several years of intense research, the area of security and cryptography in wireless sensor networks (WSNs) still has a number of open problems. On the other hand, the advent ofExpand
  • 60
  • 2
Evaluating the Economic Impact of Quality-Reducing, Seed Borne Diseases: Lessons From Karnal Bunt of Wheat
Estimates of aggregate disease costs can be used for assigning research resources or to evaluate control measures. Most diseases cause production losses, but others affect quality and marketability.Expand
  • 38
  • 2