-
1
-
-
18744397051
-
-
Wireless Integrated Network Sensors, University of California, Available: http://www.janet.ucla.edu/WINS.
-
-
-
-
2
-
-
0036688074
-
A survey on sensor networks
-
August
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8): 102-114, August 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
(Thomas Beth, Norbert Cot, and Ingemar Ingemarsson, eds.), Lecture Notes in Computer Science, Springer-Verlag
-
R. Blom. An optimal class of symmetric key generation systems. Advances in Cryptology: Proceedings of EUROCRYPT 84 (Thomas Beth, Norbert Cot, and Ingemar Ingemarsson, eds.), Lecture Notes in Computer Science, Springer-Verlag, 209:335-338, 1985.
-
(1985)
Advances in Cryptology: Proceedings of EUROCRYPT 84
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
5
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. Lecture Notes in Computer Science, 740:471-486, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, available at http://download.nai.com/products/media/nai/zip/nailabs-report-00- 010-final.zip, 2000.
-
(2000)
NAI Labs Technical Report #00-010
, vol.10
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
7
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, California, May 11-14
-
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197-213, Berkeley, California, May 11-14 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
9
-
-
33745178053
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Syracuse University, July
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. Technical Report, Syracuse University, July 2003. Available from http://www.cis.syr.edu/ ~wedu/Research/paper/ddhcv03.pdf.
-
(2003)
Technical Report
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
10
-
-
0001540595
-
On random graphs I
-
Erdos and Rényi. On random graphs I. Publ. Math. Debrecen, 6:290-297, 1959.
-
(1959)
Publ. Math. Debrecen
, vol.6
, pp. 290-297
-
-
Erdos1
Rényi2
-
14
-
-
0035526664
-
Probabilistic quorum systems
-
November
-
D. Malkhi, M. Reiter, A. Wool, and R. N. Wright. Probabilistic quorum systems. Information and Computation, (2): 184-206, November 2001.
-
(2001)
Information and Computation
, Issue.2
, pp. 184-206
-
-
Malkhi, D.1
Reiter, M.2
Wool, A.3
Wright, R.N.4
-
15
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B. C. Neuman and T. Tso. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33-38, September 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Tso, T.2
-
16
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, July
-
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), pages 189-199, Rome, Italy, July 2001.
-
(2001)
Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.D.5
-
17
-
-
0003525992
-
-
Cambridge, MA: Mass. Inst. Tech., second edition
-
W. W. Peterson. Error-Correcting Codes. Cambridge, MA: Mass. Inst. Tech., second edition, 1972.
-
(1972)
Error-correcting Codes
-
-
Peterson, W.W.1
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
|