-
2
-
-
3042783638
-
A pairwise key PreDistribution scheme for wireless sensor networks
-
Oct.
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A Pairwise Key PreDistribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS 2003), pp. 42-51, Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS 2003)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
6
-
-
27644517087
-
Key distribution techniques for sensor networks
-
T. Znati et al., eds.
-
H. Chan, A. Perrig, and D. Song, "Key Distribution Techniques for Sensor Networks," Wireless Sensor Networks, T. Znati et al., eds., 2004.
-
(2004)
Wireless Sensor Networks
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
0002917347
-
Kerberos authentication and authorization system
-
section E.2.1
-
S.P. Miller, C. Neuman, J.I. Schiller, and J.H. Saltzer, "Kerberos Authentication and Authorization System," Project Athena Technical Plan, section E.2.1, 1987.
-
(1987)
Project Athena Technical Plan
-
-
Miller, S.P.1
Neuman, C.2
Schiller, J.I.3
Saltzer, J.H.4
-
8
-
-
0003237987
-
The kerberos network authentication service (V5)
-
Sept. ftp://ftp.math.utah.edu/pub/rfc/rfc1510.txt.
-
J. Kohl and C. Neuman, "The Kerberos Network Authentication Service (V5)," RFC 1510, Sept. 1993, ftp://ftp.internic.net/rfc/rfc1510.txt, ftp://ftp.math.utah.edu/pub/rfc/rfc1510.txt.
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Neuman, C.2
-
9
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar, "SPINS: Security Protocols for Sensor Networks," Proc. Seventh Ann. Int'l Conf. Mobile Computing and Networks (MobiCom 2001), pp. 189-199, July 2001.
-
(2001)
Proc. Seventh Ann. Int'l Conf. Mobile Computing and Networks (MobiCom 2001)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
10
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Advances in Cryptology: Proc. Eurocrypt '84, pp. 335-338, 1984.
-
(1984)
Advances in Cryptology: Proc. Eurocrypt '84
, pp. 335-338
-
-
Blom, R.1
-
11
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
E.F. Brickell, ed.
-
C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences," Proc. Conf. Advances in Cryptology (Crypto '92), E.F. Brickell, ed., pp. 471-486, 1992.
-
(1992)
Proc. Conf. Advances in Cryptology (Crypto '92)
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
13
-
-
80052567846
-
Deterministic key predistribution schemes for distributed sensor networks
-
J. Lee and D. Stinson, "Deterministic Key Predistribution Schemes for Distributed Sensor Networks," Selected Areas in Cryptography, 2004.
-
(2004)
Selected Areas in Cryptography
-
-
Lee, J.1
Stinson, D.2
-
16
-
-
8344253818
-
-
Aug.
-
C.S. Laboratory, "Secure Hash Standard," pp. 180-182, Aug. 2002.
-
(2002)
Secure Hash Standard
, pp. 180-182
-
-
-
17
-
-
0010227321
-
Fast encryption and authentication: XCBC encryption and XECB authentication modes
-
M. Matsui ed., Apr.
-
V. Gligor and P. Donescu, "Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes," Fast Software Encryption (FSE), M. Matsui ed., Apr. 2001.
-
(2001)
Fast Software Encryption (FSE)
-
-
Gligor, V.1
Donescu, P.2
-
18
-
-
0004103610
-
Encryption modes with almost free message integrity
-
May
-
C. Jutla, "Encryption Modes with Almost Free Message Integrity," Proc. Advances in Cryptology-EUROCRYPT 2001, pp. 525-542, May 2001.
-
(2001)
Proc. Advances in Cryptology-EUROCRYPT 2001
, pp. 525-542
-
-
Jutla, C.1
-
19
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Nov.
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz, "OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption," Proc. Eighth ACM Conf. Computer and Comm. Security, Nov. 2001.
-
(2001)
Proc. Eighth ACM Conf. Computer and Comm. Security
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
20
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis and Defenses," Proc. Third Int'l Workshop Information Processing in Sensor Networks (IPSN), 2004.
-
(2004)
Proc. Third Int'l Workshop Information Processing in Sensor Networks (IPSN)
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
|