-
3
-
-
17444385861
-
Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
-
C. Blundo, L. Mattos, and D. Stinson. Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In Advances in Cryptology (CRYPTO), 1996.
-
(1996)
Advances in Cryptology (CRYPTO)
-
-
Blundo, C.1
Mattos, L.2
Stinson, D.3
-
11
-
-
0035474388
-
Building the IBM 4758 Secure Coprocessor
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doom, S. W. Smith, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 2001.
-
(2001)
IEEE Computer
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doom, L.5
Smith, S.W.6
Weingart, S.7
-
12
-
-
84978422134
-
Fine-grained network time synchronization using reference broadcasts
-
J. Elson, L. Girod, and D. Estrin. Fine-grained network time synchronization using reference broadcasts. SIGOPS Oper. Syst. Rev., 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
-
-
Elson, J.1
Girod, L.2
Estrin, D.3
-
25
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
R. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology (CRYPTO), 1988.
-
(1988)
Advances in Cryptology (CRYPTO)
-
-
Merkle, R.1
-
28
-
-
18844435123
-
GEM: Graph embedding for routing and data-centric storage in sensor networks without geographic information
-
Nov.
-
J. Newsome and D. Song. GEM: Graph embedding for routing and data-centric storage in sensor networks without geographic information. In ACM Conference on Embedded Networked Sensor Systems (SenSys), Nov. 2003.
-
(2003)
ACM Conference on Embedded Networked Sensor Systems (SenSys)
-
-
Newsome, J.1
Song, D.2
-
29
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In ACM Conference on Mobile Computing and Networks (MobiCom), July 2001.
-
(2001)
ACM Conference on Mobile Computing and Networks (MobiCom)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
30
-
-
0036983290
-
GHT: A geographic hash table for data-centric storage
-
Sept.
-
S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker. GHT: A geographic hash table for data-centric storage. In Proceedings of ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), Sept. 2002.
-
(2002)
Proceedings of ACM International Workshop on Wireless Sensor Networks and Applications (WSNA)
-
-
Ratnasamy, S.1
Karp, B.2
Yin, L.3
Yu, F.4
Estrin, D.5
Govindan, R.6
Shenker, S.7
-
33
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Apr. Special Issue on Computer Network Security
-
S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, Apr. 1999. Special Issue on Computer Network Security.
-
(1999)
Computer Networks
-
-
Smith, S.W.1
Weingart, S.2
-
34
-
-
0004231341
-
-
Society for Industrial and Applied Mathematics (SIAM)
-
H. Solomon. Geometric Probability. Society for Industrial and Applied Mathematics (SIAM), 1978.
-
(1978)
Geometric Probability
-
-
Solomon, H.1
-
35
-
-
0003259063
-
Key management for multicast: Issues and architectures
-
Internet Engineering Task Force, June
-
D. Wallner, E. Harder, and R. Agee. Key management for multicast: Issues and architectures. Internet Request for Comment RFC 2627, Internet Engineering Task Force, June 1999.
-
(1999)
Internet Request for Comment RFC
, vol.2627
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
36
-
-
23044524214
-
Physical security devices for computer subsystems: A survey of attacks and defenses
-
Aug.
-
S. Weingart. Physical security devices for computer subsystems: A survey of attacks and defenses. In Cryptographic Hardware and Embedded Systems (CHES), Aug. 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems (CHES)
-
-
Weingart, S.1
|