-
1
-
-
0023795996
-
An evaluation of directory schemes for cache coherence
-
Anant Agarwal, Richard Simoni, Mark Horowitz, and John Hennessy. An evaluation of directory schemes for cache coherence. In Proceedings of the 15th Annual International Symposium on Computer Architecture, pages 280-289, 1988.
-
(1988)
Proceedings of the 15th Annual International Symposium on Computer Architecture
, pp. 280-289
-
-
Agarwal, A.1
Simoni, R.2
Horowitz, M.3
Hennessy, J.4
-
2
-
-
0038650640
-
Key infection: Smart trust for smart dust
-
Unpublished Manuscript, November
-
Ross Anderson and Adrian Perrig. Key infection: Smart trust for smart dust. Unpublished Manuscript, November 2001.
-
(2001)
-
-
Anderson, R.1
Perrig, A.2
-
3
-
-
0036086453
-
Self-healing key distribution with revocation
-
May
-
Dirk Balfanz, Drew Dean, Matt Franklin, Sara Miner, and Jessica Staddon. Self-healing key distribution with revocation. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 241-257 May 2002.
-
(2002)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 241-257
-
-
Balfanz, D.1
Dean, D.2
Franklin, M.3
Miner, S.4
Staddon, J.5
-
4
-
-
0027589399
-
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
-
May
-
M. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters, 29(11):999-1001, May 1993.
-
(1993)
Electronics Letters
, vol.29
, Issue.11
, pp. 999-1001
-
-
Beller, M.1
Yacobi, Y.2
-
5
-
-
0035476075
-
Making home automation communications secure
-
Oct
-
Peter Bergstrom, Kevin Driscoll, and John Kimball. Making home automation communications secure. IEEE Computer, 34(10):50-56, Oct 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.10
, pp. 50-56
-
-
Bergstrom, P.1
Driscoll, K.2
Kimball, J.3
-
7
-
-
85084161952
-
PGP in constrained wireless devices
-
Michael Brown, Donny Cheung, Darrel Hankerson, Julio Lopez Hernandez, Michael Kirkup, and Alfred Menezes. PGP in constrained wireless devices. In 9th USENIX Security Symposium, August 2000.
-
9th USENIX Security Symposium, August 2000
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Lopez Hernandez, J.4
Kirkup, M.5
Menezes, A.6
-
8
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs Technical Report #00-010, September
-
David W. Carman, Peter S. Kruus, and Brian J. Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000.
-
(2000)
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
9
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.
-
(1976)
IEEE Trans. Inform. Theory
, Issue.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
14
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In 9th International Conference on Network Protocols (ICNP'01), 2001.
-
9th International Conference on Network Protocols (ICNP'01), 2001
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
16
-
-
0017959977
-
Secure communication over insecure channels
-
R. Merkle. Secure communication over insecure channels. Communications of the ACM, 21(4):294-299, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.1
-
18
-
-
84969354234
-
On key distribution and authentication in mobile radio networks
-
Lecture Notes in Computer Science
-
C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii. On key distribution and authentication in mobile radio networks. In Advances in Cryptology - EuroCrypt '93, pages 461-465, 1993. Lecture Notes in Computer Science Volume 765.
-
(1993)
Advances in Cryptology - EuroCrypt '93
, vol.765
, pp. 461-465
-
-
Park, C.1
Kurosawa, K.2
Okamoto, T.3
Tsujii, S.4
-
19
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), July 2001.
-
Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), July 2001
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
23
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
Lecture Notes in Computer Science
-
M. Tatebayashi, N. Matsuzaki, and D. B. Jr. Newman. Key distribution protocol for digital mobile communication systems. In Advances in Cryptology - Crypto '89, pages 324-334, 1989. Lecture Notes in Computer Science Volume 435.
-
(1989)
Advances in Cryptology - Crypto '89
, vol.435
, pp. 324-334
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman D.B., Jr.3
-
24
-
-
2642534140
-
Efficient and mutually authenticated key exchange for low power computing devices
-
Duncan S. Wong and Agnes H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology - ASIACRYPT '2001, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT '2001
-
-
Wong, D.S.1
Chan, A.H.2
-
25
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6):24-30, November/December 1969.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|