-
1
-
-
84937436045
-
Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques
-
Springer-Verlag Berlin Heidelberg
-
M. Abdalla and M. Bellare. Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques. In Advances in Cryptology, ASIACRYPT 2000, LNCS 1976. Springer-Verlag Berlin Heidelberg, 2000.
-
(2000)
Advances in Cryptology, ASIACRYPT 2000, LNCS
, vol.1976
-
-
Abdalla, M.1
Bellare, M.2
-
2
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, Y. Sankarasubramaniam, W. Su, and E. Cayirci. Wireless sensor networks: a survey. Computer Networks, 38:393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Sankarasubramaniam, Y.2
Su, W.3
Cayirci, E.4
-
5
-
-
0035789267
-
Secure pebblenets
-
Long Beach, CA, USA. ACM Press
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, Long Beach, CA, USA. ACM Press., 2001.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
7
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology: Proceedings of CRYPTO '92, volume 740 of LNCS, 1993.
-
(1993)
Advances in Cryptology: Proceedings of CRYPTO '92, Volume 740 of LNCS
, vol.740
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
8
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
Technical Report NAI Labs
-
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and approaches for distributed sensor network security. Technical Report Technical Report 00-010, NAI Labs, 2000.
-
(2000)
Technical Report 00-010
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
10
-
-
12444324513
-
Providing secrecy in key management protocols for large wireless sensors networks
-
R. Di Pietro, L. V. Mancini, and S. Jajodia. Providing secrecy in key management protocols for large wireless sensors networks. Journal of AdHoc Networks, 1(4), 2003.
-
(2003)
Journal of AdHoc Networks
, vol.1
, Issue.4
-
-
Di Pietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
18
-
-
0003618441
-
Report on the development of the advanced encryption standard (aes)
-
Technical Report NIST
-
J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback. Report on the development of the advanced encryption standard (aes). Technical Report Technical Report, NIST, 2000.
-
(2000)
Technical Report
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Roback, E.7
-
19
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. C. Neuman and T. Tso. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9), 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
-
-
Neuman, B.C.1
Tso, T.2
|