-
1
-
-
0035789267
-
Secure pebblenets
-
BASAGNI, S., HERRIN, K., BRUSCHI, D., AND ROSTI,E. 2001. Secure pebblenets. In Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing. 156-163.
-
(2001)
Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
2
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
BLUNDO, C., DE SANTIS, A., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1993. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology - CRYPTO '92. Lecture Notes in Computer Science, vol. 740, Springer-Verlag, Berlin, 471-486.
-
(1993)
Advances in Cryptology - CRYPTO '92
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
3
-
-
4544365398
-
-
Tech. rep., NAI Labs
-
CARMAN, D., KRUUS, P., AND B. J., MATT. 2000. Constrains and Approaches for Distributed Sensor Network Security. Tech. rep., NAI Labs.
-
(2000)
Constrains and Approaches for Distributed Sensor Network Security
-
-
Carman, D.1
Kruus, P.2
Matt, B.J.3
-
5
-
-
13244263673
-
-
Accessed in February 2004
-
CROSSBOW TECHNOLOGY INC. 2004. Wireless sensor networks. http://www.xbow.com/Products/Wiraless_Sensor_Networks.htm. Accessed in February 2004.
-
(2004)
Wireless Sensor Networks
-
-
-
7
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
DU, W., DENG, J., HAN, Y. S., CHEN, S., AND VARSHNEY, P. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04.
-
(2004)
Proceedings of IEEE INFOCOM'04
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
8
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
DU, W., DENG, J., HAN, Y. S., AND VARSHNEY, P. 2003. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03). 42-61.
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-61
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
10
-
-
0037702249
-
The nesC language: A holistic approach to networked embedded systems
-
GAY, D., LEVIS, P., VON BEHREN, R., WELSH, M., BREWER, E., AND CULLER, D. 2003. The nesC language: A holistic approach to networked embedded systems. In Proceedings of Programming Language Design and Implementation (PLDI 2003).
-
(2003)
Proceedings of Programming Language Design and Implementation (PLDI 2003)
-
-
Gay, D.1
Levis, P.2
Von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
11
-
-
0022793132
-
How to construct random functions
-
GOLDREICH, O., GOLDWASSER, S., AND MICALI, S. 1986. How to construct random functions. J. ACM 33, 4 (Oct.), 792-807.
-
(1986)
J. ACM
, vol.33
, Issue.4 OCT
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
12
-
-
0034445661
-
System architecture directions for networked sensors
-
HILL, J., SZEWCZYK, R., Woo, A., HOLLAR, S., CULLER, D., AND PISTER, K. S. J. 2000. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems. 93-104.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.S.J.6
-
20
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
NEWSOME, J., SHI, R., SONG, D., AND PERRIG, A. 2004. The sybil attack in sensor networks: Analysis and defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004).
-
(2004)
Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004)
-
-
Newsome, J.1
Shi, R.2
Song, D.3
Perrig, A.4
-
22
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
PERRIG, A., CANETTI, R., SONG, D., AND TYGAR, D. 2000. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the 2000 IEEE Symposium on Security and Privacy.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
23
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
PERRIG, A., CANETTI, R., SONG, D., AND TYGAR, D. 2001a. Efficient and secure source authentication for multicast. In Proceedings of Network and Distributed System Security Symposium.
-
(2001)
Proceedings of Network and Distributed System Security Symposium
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
24
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
PERRIG, A., SZEWCZYK, R., WEN, V., CULLER, D., AND TYGAR, D. 2001b. SPINS: Security protocols for sensor networks. In Proceedings of 7th Annual International Conference on Mobile Computing and Networks.
-
(2001)
Proceedings of 7th Annual International Conference on Mobile Computing and Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
31
-
-
2642534140
-
Efficient and mutually authenticated key exchange for low power computing devices
-
WONG, D. AND CHAN, A. 2001. Efficient and mutually authenticated key exchange for low power computing devices. In Proceedings of ASIA CRYPT 2001.
-
(2001)
Proceedings of ASIA CRYPT 2001
-
-
Wong, D.1
Chan, A.2
-
32
-
-
0036793924
-
Denial of service in sensor networks
-
WOOD, A. D. AND STANKOVIC, J. A. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10, 54-62.
-
(2002)
IEEE Comput.
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
34
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
-
ZHU, S., SETIA, S., JAJODIA, S., AND NING, P. 2004. An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In Proceedings of 2004 IEEE Symposium on Security and Privacy.
-
(2004)
Proceedings of 2004 IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|