-
1
-
-
0036688074
-
A survey on sensor networks
-
AKYILDIZ, I. F., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIRCI, E. 2002. A survey on sensor networks. IEEE Communications Magazine 40, 8 (Aug.), 102-114.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8 AUG.
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
BELLARE, M., KILIAN, J., AND ROGAWAY, P. 2000. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61, 3, 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
5
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptology: Proceedings of EUROCRYPT 84, T. Beth, N. Cot, and I. Ingemarsson, Eds. Springer-Verlag, Berlin
-
BLOM, R. 1985. An optimal class of symmetric key generation systems. In Advances in Cryptology: Proceedings of EUROCRYPT 84, T. Beth, N. Cot, and I. Ingemarsson, Eds. Lecture Notes in Computer Science, vol. 209, Springer-Verlag, Berlin, 335-338.
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
6
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
BLUNDO, C., SANTIS, A. D., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1993. Perfectly-secure key distribution for dynamic conferences. In Lecture Notes in Computer Science, vol. 740, 471-486.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
7
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, CA
-
CHAN, H., PERRIG, A., AND SONG, D. 2003. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, Berkeley, CA. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
84860981490
-
-
CROSSBOW TECHNOLOGY, INC. Available at http://www.xbow.com/.
-
-
-
-
9
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
Du, W., DENG, J., HAN, Y. S., AND VARSHNEY, P. 2003. A pairwise key predistribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security. 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
10
-
-
0001540595
-
On random graphs I
-
ERDOS AND RÉNYI. 1959. On random graphs I. Publ. Math. Debrecen 6, 290-297.
-
(1959)
Publ. Math. Debrecen
, vol.6
, pp. 290-297
-
-
Erdos1
Rényi2
-
15
-
-
0035526664
-
Probabilistic quorum systems
-
MALKHI, D., REITER, M., WOOL, A., AND WRIGHT, R. N. 2001. Probabilistic quorum systems. Information and Computation 170, 2, 184-206.
-
(2001)
Information and Computation
, vol.170
, Issue.2
, pp. 184-206
-
-
Malkhi, D.1
Reiter, M.2
Wool, A.3
Wright, R.N.4
-
16
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
NEUMAN, B. C. AND Tso, T. 1994. Kerberos: An authentication service for computer networks. IEEE Communications 32, 9 (Sept.), 33-38.
-
(1994)
IEEE Communications
, vol.32
, Issue.9 SEPT.
, pp. 33-38
-
-
Neuman, B.C.1
Tso, T.2
-
17
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
PERRIG, A., SZEWCZYK, R., WEN, V., CULLAR, D., AND TYGAR, J. 2001. SPINS: Security protocols for sensor networks. In Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). 189-199.
-
(2001)
Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.5
|