-
1
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC. Nov.
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS, Washington, DC. Nov. 2002.
-
(2002)
ACM CCS
-
-
Eschenauer, L.1
Gligor, V.2
-
2
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks." in IEEE Symposium on Security & Privacy, Oakland, CA, May 2003.
-
(2003)
IEEE Symposium on Security & Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington. DC, Oct.
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS, Washington. DC, Oct. 2003.
-
(2003)
ACM CCS
-
-
Liu, D.1
Ning, P.2
-
4
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
Washington, DC, Oct.
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in ACM CCS, Washington, DC, Oct. 2003.
-
(2003)
ACM CCS
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
5
-
-
24944523654
-
Location-based pairwise key establishments for static sensor networks
-
Fairfax, VA, Oct.
-
D. Liu and P. Ning. "Location-based pairwise key establishments for static sensor networks," in ACM SASN, Fairfax, VA, Oct. 2003.
-
(2003)
ACM SASN
-
-
Liu, D.1
Ning, P.2
-
6
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
HongKong, China, March
-
W. Du, J. Deng, Y. Han, S. Chen, and P.K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in IEEE INFOCOM, HongKong, China, March 2004.
-
(2004)
IEEE INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.K.5
-
7
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
8
-
-
0037623983
-
Identify-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identify-based encryption from the weil pairing," SIAM Journal of Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
ser. LNCS. Springer-Verlag
-
P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Proc. CRYPTO'02, ser. LNCS, vol. 2442. Springer-Verlag, 2002, pp. 354-368.
-
(2002)
Proc. CRYPTO'02
, vol.2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Bynn, B.3
Scott, M.4
-
10
-
-
24944445508
-
-
Federal Information Processing Standards PUBlication 180-1, April
-
NIST, "Digital hash standard," Federal Information Processing Standards PUBlication 180-1, April 1995.
-
(1995)
Digital Hash Standard
-
-
-
12
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
84948990100
-
The rc5 encryption algorithm
-
ser. LNCS. Springer-Verlag
-
R. Rivest, "The rc5 encryption algorithm," in Fast Software Encryption, ser. LNCS, vol. 1008. Springer-Verlag, 1995, pp. 86-96.
-
(1995)
Fast Software Encryption
, vol.1008
, pp. 86-96
-
-
Rivest, R.1
-
14
-
-
0034772133
-
Geography-informed energy conservation for ad hoc routing
-
Rome,Italy, July
-
Y. Xu, J. Heidemann, and D. Estrin, "Geography-informed energy conservation for ad hoc routing," in ACM MobiCom, Rome,Italy, July 2001.
-
(2001)
ACM MobiCom
-
-
Xu, Y.1
Heidemann, J.2
Estrin, D.3
-
15
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," AD Hoc Networks, vol. 1, no. 2, 2003.
-
(2003)
AD Hoc Networks
, vol.1
, Issue.2
-
-
Karlof, C.1
Wagner, D.2
-
16
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
Berkeley, CA, April
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses," in Proc. of the Third International Symposium on Information Processing in Sensor Networks (IPSN 2004), Berkeley, CA, April 2004.
-
(2004)
Proc. of the Third International Symposium on Information Processing in Sensor Networks (IPSN 2004)
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
17
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
San Francisco, CA, April
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in IEEE INFOCOM, San Francisco, CA, April 2003.
-
(2003)
IEEE INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
18
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
ser. LNCS. Springer-Verlag
-
A. Shamir, "Identity based cryptosystems and signature schemes," in Proc. CRYPTO'84, ser. LNCS, vol. 196. Springer-Verlag, 1984, pp. 47-53.
-
(1984)
Proc. CRYPTO'84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
19
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, CA. Oct.
-
D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," in IEEE SECON, Santa Clara, CA. Oct. 2004.
-
(2004)
IEEE SECON
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
20
-
-
27244436587
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Boston, MA, Aug.
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and rsa on 8-bit cpus," in CHES'04, Boston, MA, Aug. 2004.
-
(2004)
CHES'04
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
21
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
Washington, DC, Oct.
-
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, "Tinypk: Securing sensor networks with public key technology," in ACM SASN, Washington, DC, Oct. 2004.
-
(2004)
ACM SASN
-
-
Watro, R.1
Kong, D.2
Fen Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
22
-
-
31844450265
-
Public keys cryptography in sensor networks - Revisited
-
EURESCOM, Heidelberg, Germany, Aug.
-
G. Gaubatz and B. S. J. Kaps, "Public keys cryptography in sensor networks - revisited," in ESAS'04, EURESCOM, Heidelberg, Germany, Aug. 2004.
-
(2004)
ESAS'04
-
-
Gaubatz, G.1
Kaps, B.S.J.2
-
23
-
-
35048900981
-
On the selection of pairing-friendly groups
-
ser. LNCS. Springer-Verlag
-
P. Barreto, B. Lynn, and M. Scott, "On the selection of pairing-friendly groups," in Selected Areas in Cryptography - SAC '2003, ser. LNCS, vol. 3006. Springer-Verlag, 2004, pp. 17-25.
-
(2004)
Selected Areas in Cryptography - SAC '2003
, vol.3006
, pp. 17-25
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
|