-
4
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
(LNCS). Springer-Verlag, Berlin
-
Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Advances in Cryptology - EUROCRYPT '84 (LNCS 209). Springer-Verlag, Berlin 1985, pp. 335-338.
-
(1985)
Advances in Cryptology - EUROCRYPT '84
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
5
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
(LNCS). Springer-Verlag, Berlin
-
Blundo, C., Santis, A.D., Herzberg, A., Kutton, S., Vaccaro, U., and Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Advances in Cryptology - CRYPTO '92 (LNCS 740). Springer-Verlag, Berlin 1993, pp. 471-486.
-
(1993)
Advances in Cryptology - CRYPTO '92
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutton, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
33746751305
-
Middleware for swarm-like collections of devices
-
Buschmann, C., Fischer, S., Luttenberger, N., and Reuter, F.: Middleware for Swarm-Like Collections of Devices. IEEE Pervasive Computing Magazine, Vol. 2, No. 4, 2003, p. 96.
-
(2003)
IEEE Pervasive Computing Magazine
, vol.2
, Issue.4
, pp. 96
-
-
Buschmann, C.1
Fischer, S.2
Luttenberger, N.3
Reuter, F.4
-
7
-
-
0010461175
-
-
Technical Report, NAI Labs
-
Carman, D.W., Kruus, P.S., and Matt, B.J.: Constraints an Approaches for Distributed Sensor Network Security. Technical Report, NAI Labs 2000.
-
(2000)
Constraints an Approaches for Distributed Sensor Network Security
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
8
-
-
0142103313
-
Security and privacy in sensor networks
-
October
-
Chan, H., and Perrig, A.: Security and Privacy in Sensor Networks. In: IEEE Computer, Vol.36, No.10, October 2003, pp. 103-105
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
9
-
-
0038487088
-
Predistribution schemes for sensor networks
-
IEEE Computer Society Press, Los Alamos
-
Chan, H., Perrig, A., and Song, D.: Predistribution Schemes for Sensor Networks. In: Proceedings of the IEEE Security and Privacy Symposium. IEEE Computer Society Press, Los Alamos 2003. pp. 197-213
-
(2003)
Proceedings of the IEEE Security and Privacy Symposium
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
12
-
-
84937438994
-
Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers
-
(LNCS), Springer-Verlag, Berlin
-
Guajardo, J., Bluemel, R., Krieger, U., and Paar, C.: Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP430x33x Family of Microcontrollers. In: Proceedings of the International Workshop on Practice and Theory in Public Key Cryptography '01 (LNCS 1992), Springer-Verlag, Berlin 2001. pp. 365-382.
-
(2001)
Proceedings of the International Workshop on Practice and Theory in Public Key Cryptography '01
, vol.1992
, pp. 365-382
-
-
Guajardo, J.1
Bluemel, R.2
Krieger, U.3
Paar, C.4
-
19
-
-
33645412242
-
-
Scatterweb Projekt: Embedded Sensor Board ESB 430/1. http://www.inf. fuberlin.de/inst/ag-tech/esb/english/index.htm. 2004.
-
(2004)
Embedded Sensor Board ESB
, vol.430
, Issue.1
-
-
-
20
-
-
0012584245
-
-
Technical Report CORR-9939, Dept of C&O, University of Waterloo, Canada
-
Solinas, J.A.: Generalized Mersenne Numbers. Technical Report CORR-9939, Dept of C&O, University of Waterloo, Canada, 1999.
-
(1999)
Generalized Mersenne Numbers
-
-
Solinas, J.A.1
-
22
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
Wood, A.D., and Stankovic, J.A.: Denial of Service in Sensor Networks. In: IEEE Computer, Vol. 35, No. 10, October 2002, pp. 54-62.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
24
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
ACM Press, Washington DC
-
Zhu, S., Setia, S., and Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the Conference on Computer and Communications Security '03. ACM Press, Washington DC, 2003. pp. 62-72.
-
(2003)
Proceedings of the Conference on Computer and Communications Security '03
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|