-
1
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. of ACM CCS, 2002, pp. 41-47.
-
(2002)
Proc. of ACM CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
2
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. of the IEEE Symposium on Security and Privacy, 2003, pp. 197-215.
-
(2003)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 197-215
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key pre-distribution scheme for wireless sensor networks," in Proc. of ACM CCS, 2003, pp. 42-51.
-
(2003)
Proc. of ACM CCS
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
4
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proc. of ACM CCS, 2003, pp. 52-61.
-
(2003)
Proc. of ACM CCS
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
5
-
-
0000893265
-
An optimal class of symmetric key generation systems
-
R. Blom, "An optimal class of symmetric key generation systems," in Proc. of the EUROCRYPT 84, 1985, pp. 335-338.
-
(1985)
Proc. of the EUROCRYPT
, vol.84
, pp. 335-338
-
-
Blom, R.1
-
6
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Proc. of the 12th Annual International Cryptology Conference on Advances in Cryptology, 1993, pp. 471-486.
-
(1993)
Proc. of the 12th Annual International Cryptology Conference on Advances in Cryptology
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
7
-
-
12444300139
-
Efficient and resilient key discovery based on pseudo-random key pre-deployment
-
R. D. Pietro, L. V. Mancini, and A. Mei, "Efficient and resilient key discovery based on pseudo-random key pre-deployment," in Proc. of IPDPS'04, 2004.
-
(2004)
Proc. of IPDPS'04
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
8
-
-
0003851399
-
-
John Wiley and Sons, Inc.
-
B. Schneier, Applied cryptography: protocols, algorithms, and source code in C, 2nd ed. John Wiley and Sons, Inc., 1995.
-
(1995)
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Ed.
-
-
Schneier, B.1
-
9
-
-
0003629991
-
-
FIPS PUB 180-1, National Institute of Standards and Technology, U.S. Department Of Commerce, April
-
"Secure hash standard," FIPS PUB 180-1, National Institute of Standards and Technology, U.S. Department Of Commerce, April 1995.
-
(1995)
Secure Hash Standard
-
-
|