-
1
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sept.
-
B.C. Neuman and T. Tso, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm., vol. 32, no. 9, pp. 33-38, Sept. 1994.
-
(1994)
IEEE Comm.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Tso, T.2
-
2
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J.D. Tygar, "Spins: Security Protocols for Sensor Networks," Proc. Seventh Ann. ACM/IEEE Int'l Conf. Mobile Computing and Networking (MobiCom), pp. 189-199, July 2001.
-
(2001)
Proc. Seventh Ann. ACM/IEEE Int'l Conf. Mobile Computing and Networking (MobiCom)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.D.5
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," IEEE Symp. Security and Privacy, pp. 197-213, 2003.
-
(2003)
IEEE Symp. Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y.S. Han, and P.K. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS), pp. 42-51, 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
9
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y.S. Han, S. Chen, and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," Proc. IEEE INFOCOM '04, pp. 586-597, 2004.
-
(2004)
Proc. IEEE INFOCOM '04
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
10
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
D. Huang, M. Mehta, D. Medhi, and L. Harn, "Location-Aware Key Management Scheme for Wireless Sensor Networks," Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, 2004.
-
(2004)
Proc. ACM Workshop Security of Ad Hoc and Sensor Networks
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
11
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment in Sensor Networks," Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Chan, H.1
Perrig, A.2
-
14
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences," Lecture Notes in Computer Science, vol. 740, pp. 471-486, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
15
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
M. Tatebayashi, N. Matsuzaki, and D.B. Newman, "Key Distribution Protocol for Digital Mobile Communication Systems," Advances in Cryptology - Proc. CRYPTO '89, pp. 324-334, 1989.
-
(1989)
Advances in Cryptology - Proc. CRYPTO '89
, pp. 324-334
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.3
-
16
-
-
0027589399
-
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
-
M. Beller and Y. Yacobi, "Fully-Fledged Two-Way Public Key Authentication and Key Agreement for Low-Cost Terminals," Electronics Letters, vol. 29, no. 11, pp. 999-1001, 1993.
-
(1993)
Electronics Letters
, vol.29
, Issue.11
, pp. 999-1001
-
-
Beller, M.1
Yacobi, Y.2
-
17
-
-
84956854891
-
Key establishment protocols for secure mobile communications: A selective survey
-
C. Boyd and A. Mathuria, "Key Establishment Protocols for Secure Mobile Communications: A Selective Survey," Lecture Notes in Computer Science, vol. 1438, pp. 344-355, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1438
, pp. 344-355
-
-
Boyd, C.1
Mathuria, A.2
-
18
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Advances in Cryptology: Proc. EUROCRYPT '84, pp. 335-338, 1985.
-
(1985)
Advances in Cryptology: Proc. EUROCRYPT '84
, pp. 335-338
-
-
Blom, R.1
-
20
-
-
0003582910
-
-
C.E. Perkins, ed. Addison-Wesley
-
Ad Hoc Networking, C.E. Perkins, ed. Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
-
-
-
22
-
-
0041939724
-
Unreliable sensor grids: Coverage, connectivity, and diameter
-
S. Shakkottai, R. Srikant, and N. Shroff, "Unreliable Sensor Grids: Coverage, Connectivity, and Diameter," Proc. IEEE INFOCOM, pp. 1073-1083, 2003.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1073-1083
-
-
Shakkottai, S.1
Srikant, R.2
Shroff, N.3
-
23
-
-
11244289227
-
On k-coverage in a mostly sleeping sensor network
-
S. Kumar, T.H. Lai, and J. Balogh, "On k-Coverage in a Mostly Sleeping Sensor Network," Proc. 10th Ann. Int'l Conf. Mobile Computing and Networking, pp. 144-158, 2004.
-
(2004)
Proc. 10th Ann. Int'l Conf. Mobile Computing and Networking
, pp. 144-158
-
-
Kumar, S.1
Lai, T.H.2
Balogh, J.3
-
24
-
-
84858546210
-
-
2006
-
Crossbow Technology, Inc., http://www.xbow.com/, 2006.
-
-
-
|