-
1
-
-
0033748607
-
New multiparty authentication services and key agreement protocols
-
G. Ateniese, M. Steiner, G. Tsudik, New multiparty authentication services and key agreement protocols, IEEE Journal on Selected Areas in Communications 18 (4) (2000) 628-639.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
2
-
-
0035789267
-
Secure pebblenets
-
Long Beach, CA, USA, ACM Press, New York
-
S. Basagni, K. Herrin, D. Bruschi, E. Rosti, Secure pebblenets, in: Proceedings of the 2001 ACM International Symposium on Mobile ad hoc Networking & Computing, Long Beach, CA, USA, ACM Press, New York, 2001, pp. 156-163.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
3
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, USA, 11-14 May
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 11-14 May 2003, pp. 197-213.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
0033347104
-
Performance comparison of battery power consumption in wireless multiple access protocols
-
J.-C. Chen, K.M. Sivalingam, P. Agrawal, Performance comparison of battery power consumption in wireless multiple access protocols, Wireless Networks 5 (6) (1999) 445-460.
-
(1999)
Wireless Networks
, vol.5
, Issue.6
, pp. 445-460
-
-
Chen, J.-C.1
Sivalingam, K.M.2
Agrawal, P.3
-
5
-
-
85030814004
-
-
June
-
D.A.R.P.A., June 2002. www.darpa.mil/mto/mems.
-
(2002)
-
-
-
6
-
-
4544290017
-
Secure selective exclusion in ad hoc wireless network
-
Cairo, Egypt, 5-7 May Kluwer, Dordrecht, 2002
-
R. Di Pietro, L.V. Mancini, S. Jajodia, Secure selective exclusion in ad hoc wireless network, in: Proceedings of the 17th IFIP International Conference on Information Security, Cairo, Egypt, 5-7 May 2002, Kluwer, Dordrecht, 2002, pp. 423-434.
-
(2002)
Proceedings of the 17th IFIP International Conference on Information Security
, pp. 423-434
-
-
Di Pietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
7
-
-
84904280253
-
A time driven methodology for keys dimensioning in secure multicast communications
-
Athens, Greece, 26-28 May 2003, Kluwer, Dordrecht
-
R. Di Pietro, L.V. Mancini, A. Mei, A time driven methodology for keys dimensioning in secure multicast communications, in: Proceedings of the 18th International Conference on Information Security, Athens, Greece, 26-28 May 2003, Kluwer, Dordrecht, 2003, pp. 121-132.
-
(2003)
Proceedings of the 18th International Conference on Information Security
, pp. 121-132
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
8
-
-
4544301464
-
Random keys assignment for secure wireless sensor networks
-
31 October Fairfax, VA, USA
-
R. Di Pietro, L.V. Mancini, A. Mei, Random keys assignment for secure wireless sensor networks, in: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), 31 October 2003, Fairfax, VA, USA.
-
(2003)
Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03)
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
10
-
-
1542341272
-
Fine-grained network time synchronization using reference broadcasts
-
Boston, MA, USA, 9-11 December
-
J. Elson, L. Girod, D. Estrin, Fine-grained network time synchronization using reference broadcasts, in: Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), Boston, MA, USA, 9-11 December 2002.
-
(2002)
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002)
-
-
Elson, J.1
Girod, L.2
Estrin, D.3
-
11
-
-
3142728212
-
Wireless sensor networks: A new regime for time synchronization
-
J. Elson, K. Römer, Wireless sensor networks: a new regime for time synchronization, ACM SIGCOMM Computer Communication Review 33 (1) (2003) 149-154.
-
(2003)
ACM SIGCOMM Computer Communication Review
, vol.33
, Issue.1
, pp. 149-154
-
-
Elson, J.1
Römer, K.2
-
12
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM Press, New York
-
L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, New York, 2002, pp. 41-47.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
13
-
-
0038318458
-
Logical key hierarchy protocol
-
IETF, April
-
H. Harney, E. Harder, Logical key hierarchy protocol, Internet draft, IETF, April 1999.
-
(1999)
Internet Draft
-
-
Harney, H.1
Harder, E.2
-
14
-
-
17544377081
-
System architecture directions for networked sensors
-
Cambridge, MA, USA, 12-15 November ACM-SIGPLAN, 2000
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, K.S.J. Pister, System architecture directions for networked sensors, in: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), Cambridge, MA, USA, 12-15 November 2000, ACM-SIGPLAN, 2000, pp. 93-104.
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
15
-
-
85116610435
-
Mobile networking for smart dust
-
ACM Press, New York
-
J.M. Kahn, R.H. Katz, K.J. Pister, Mobile networking for smart dust, in: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom99), ACM Press, New York, 1999, pp. 271-278.
-
(1999)
Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom99)
, pp. 271-278
-
-
Kahn, J.M.1
Katz, R.H.2
Pister, K.J.3
-
16
-
-
0345755816
-
Adaptive security for multi-layer ad hoc networks
-
J. Kong, H. Luo, K. Xu, D.L. Gu, M. Gerla, S. Lu, Adaptive security for multi-layer ad hoc networks, Wireless Communications and Mobile Computing 2 (5) (2002) 533-547.
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
17
-
-
0017996760
-
Time, clocks, the ordering of events in a distributed system
-
L. Lamport, Time, clocks, the ordering of events in a distributed system, Communications of the ACM 21 (7) (1978) 558-565.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
19
-
-
0003584029
-
-
Fips Pub. 140-1, National Institute of Standard and Technology, January
-
Security Requirements for Cryptographic Modules, Fips Pub. 140-1, National Institute of Standard and Technology, January 1994.
-
(1994)
Security Requirements for Cryptographic Modules
-
-
-
21
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
February Internet Society, 2001
-
A. Perrig, R. Canetti, D. Song, J.D. Tygar, Efficient and secure source authentication for multicast, in: Network and Distributed System Security Symposium, NDSS'01, February 2001, Internet Society, 2001, pp. 35-46.
-
(2001)
Network and Distributed System Security Symposium, NDSS'01
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
22
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
A. Perrig, R. Canetti, J.D. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: IEEE Symposium on Security and Privacy, May 2000, pp. 56-73.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
23
-
-
0034838199
-
Elk, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, J.D. Tygar, Elk, a new protocol for efficient large-group key distribution, in: Proceedings of 2001 IEEE Symposium on Security & Privacy, 2001, pp. 247-262.
-
(2001)
Proceedings of 2001 IEEE Symposium on Security & Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
24
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
ACM Press, New York
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, Spins: security protocols for sensor networks, in: Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, ACM Press, New York, 2001, pp. 189-199.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
25
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless network
-
E.M. Royer, C.-K. Toh, A review of current routing protocols for ad hoc mobile wireless network, IEEE Personal Communication Magazine 6 (2) (1999) 46-55.
-
(1999)
IEEE Personal Communication Magazine
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.-K.2
-
27
-
-
0003851399
-
-
Wiley, New York
-
B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, second ed., Wiley, New York, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Ed.
-
-
Schneier, B.1
-
28
-
-
0035279599
-
Dynamic power management in wireless sensor networks
-
A. Sinha, A. Chandrakasan, Dynamic power management in wireless sensor networks, IEEE Design and Test of Computer 18 (2) (2001) 62-74.
-
(2001)
IEEE Design and Test of Computer
, vol.18
, Issue.2
, pp. 62-74
-
-
Sinha, A.1
Chandrakasan, A.2
-
29
-
-
0034247455
-
Key agreement in dynamic peer groups
-
M. Steiner, G. Tsudik, M. Waidner, Key agreement in dynamic peer groups, IEEE Transactions on Parallel and Distributed Systems 11 (8) (2000) 769-780.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
30
-
-
0003259063
-
Key management for multicast: Issues and architectures
-
June
-
D. Wallner, E. Harder, R. Agee, Key Management for Multicast: Issues and Architectures, RFC 2627, June 1999.
-
(1999)
RFC
, vol.2627
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
31
-
-
0033893174
-
Secure group communications using key graphs
-
C.K. Wong, M. Gouda, S.S. Lam, Secure group communications using key graphs, IEEE/ACM Transactions on Networking 8 (1) (2000) 16-30.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|