-
1
-
-
0035789267
-
Secure pebblenets
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proc. of ACM Int'l Symp. on Mobile ad hoc networking and computing, pages 156-163, 2001.
-
(2001)
Proc. of ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
2
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Advances in Cryptology - CRYPTO '92
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology - CRYPTO '92, LNCS 740, pages 471-486, 1993.
-
(1993)
LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
3
-
-
4544365398
-
Constrains and approaches for distributed sensor network security
-
NAI Labs
-
D.W. Carman, P.S. Kruus, and B.J.Matt. Constrains and approaches for distributed sensor network security. Technical report, NAI Labs, 2000.
-
(2000)
Technical Report
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
6
-
-
0022793132
-
How to construct random functions
-
October
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. of the ACM, 33(4):792-807, October 1986.
-
(1986)
J. of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
8
-
-
0006740356
-
Seminumerical algorithms
-
Addison-Wesley, third edition, ISBN: 0-201-89684-2
-
D.E. Knuth. The Art of Computer Programming, volume Vol. 2: Seminumerical Algorithms. Addison-Wesley, third edition, 1997. ISBN: 0-201-89684-2.
-
(1997)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
9
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
February
-
D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proc. of the 10th Annual Network and Distributed System Security Symposium, pages 263-276, February 2003.
-
(2003)
Proc. of the 10th Annual Network and Distributed System Security Symposium
, pp. 263-276
-
-
Liu, D.1
Ning, P.2
-
12
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar. Spins: Security protocols for sensor networks. In Proc. of Seventh Annual Int'l Conf. on Mobile Computing and Networks, July 2001.
-
(2001)
Proc. of Seventh Annual Int'l Conf. on Mobile Computing and Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
15
-
-
2642534140
-
Efficient and mutually authenticated key exchange for low power computing devices
-
December
-
D. Wong and A. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Proc. ASIACRYPT 2001., December 2001.
-
(2001)
Proc. ASIACRYPT 2001
-
-
Wong, D.1
Chan, A.2
-
16
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62 October 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
|