-
1
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Blom, R.: An optimal class of symmetric key generation systems. Eurocrypt, LNCS 209 84, 335-338 (1985)
-
(1985)
Eurocrypt, LNCS 209
, vol.84
, pp. 335-338
-
-
Blom, R.1
-
2
-
-
33645980456
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. Eurosics (2004)
-
(2004)
Eurosics
-
-
Camtepe, S.A.1
Yener, B.2
-
3
-
-
33646843766
-
A hybrid design of key pre-distribution scheme for wireless sensor networks
-
ICISS Lecture Notes in Computer Science Springer Verlag (2005)
-
Chakrabarti, D., Maitra, S., Roy, B.: A hybrid design of key pre-distribution scheme for wireless sensor networks. In: The 1st International Conference on Information Systems Security, ICISS 2005, vol. 3803, Lecture Notes in Computer Science, pp. 228-238. Springer Verlag (2005)
-
(2005)
The 1st International Conference on Information Systems Security
, vol.3803
, pp. 228-238
-
-
Chakrabarti, D.1
Maitra, S.2
Roy, B.3
-
4
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197-213 (2003)
-
(2003)
IEEE Symposium on Research in Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireles sensor networks
-
ACM CCS
-
Du, W., Ding, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireles sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 42-51. ACM CCS (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Ding, J.2
Han, Y.S.3
Varshney, P.K.4
-
8
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
CHES, LNCS 3156
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. CHES, LNCS 3156, pp. 119-132 (2004)
-
(2004)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
9
-
-
0003237904
-
Next century challenges: Mobile networking for smart dust
-
Kahn, J.M., Katz, RMH., Pister, K.S.J.: Next century challenges: mobile networking for smart dust. In: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 483-492 (1999)
-
(1999)
Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 483-492
-
-
Kahn, J.M.1
Katz, R.H.2
Pister, K.S.J.3
-
10
-
-
24144503356
-
Deterministic key predistribution schemes for distributed sensor networks
-
SAC, LNCS
-
Lee, J., Stinson, D.: Deterministic key predistribution schemes for distributed sensor networks. SAC, LNCS 3357, pp. 294-307 (2004)
-
(2004)
, vol.3357
, pp. 294-307
-
-
Lee, J.1
Stinson, D.2
-
11
-
-
24944550584
-
A combinatorial approach to key predistribution for distributed sensor networks
-
(WCNC 2005). New Orleans, LA, USA
-
Lee, J., Stinson, D.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Computing and Networking Conference (WCNC 2005). New Orleans, LA, USA (2005)
-
(2005)
IEEE Wireless Computing and Networking Conference
-
-
Lee, J.1
Stinson, D.2
-
13
-
-
0003987443
-
-
2nd edn. Chapman & Hall, CRC Press, Boca Raton, Florida
-
Stinson, D.: Cryptography: Theory and Practice, 2nd edn. Chapman & Hall, CRC Press, Boca Raton, Florida (2002)
-
(2002)
Cryptography: Theory and Practice
-
-
Stinson, D.1
|