-
5
-
-
0013138808
-
Dynamic traitor tracing
-
Amos Fiat and Tamir Tassa. Dynamic traitor tracing. Journal of Cryptology, 14(3):211-223, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.3
, pp. 211-223
-
-
Fiat, A.1
Tassa, T.2
-
6
-
-
0033877788
-
Energy-efficient communication protocol for wireless microsensor networks
-
Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In HICSS, 2000.
-
(2000)
HICSS
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
7
-
-
0034445661
-
System architecture directions for network sensors
-
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. System architecture directions for network sensors. In Proceedings of ASPLOS, 2000.
-
(2000)
Proceedings of ASPLOS
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
9
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
N. Y., August 6-11. ACM Press
-
Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00), pages 56-67, N. Y., August 6-11 2000. ACM Press.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00)
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
10
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
February. Status: INFORMATIONAL
-
H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104: HMAC: Keyed-hashing for message authentication, February 1997. Status: INFORMATIONAL.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
13
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, August
-
Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (Mobicom '2000), pages 255-265, Boston, MA, August 2000.
-
(2000)
Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (Mobicom '2000)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
14
-
-
84944878354
-
-
The CRC Press series on discrete mathematics and its applications. CRC Press, N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA
-
A. J. (Alfred J.) Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
15
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. Tygar. Spins: Security protocols for sensor networks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (Mobicom '2001), 2001.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (Mobicom '2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.5
|