-
1
-
-
84884730529
-
An optimal class of symmetrie key generation systems
-
LNCS, Springer-Verlag
-
R. Blom, "An Optimal Class of Symmetrie Key Generation Systems", in Advances in Cryptology EUROCRYPT'84, LNCS, vol. 209, Springer-Verlag, pp. 335-338, 1985.
-
(1985)
Advances in Cryptology EUROCRYPT'84
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
2
-
-
0038487088
-
Random key redistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random Key Redistribution Schemes for Sensor Networks", in IEEE Symposium on Research in Security and Privacy, pp. 197-213, 2003.
-
(2003)
IEEE Symposium on Research in Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
24944474308
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks", in ACM CCS'03.
-
ACM CCS'03
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
4
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge", in IEEE INFOCOM 2004.
-
IEEE INFOCOM 2004
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
5
-
-
33646714804
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer, eand V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks", in ACM CCS'02.
-
ACM CCS'02
-
-
Eschenauer, L.1
Gligor, V.D.2
-
6
-
-
0001553129
-
Critical power for asymptotic connectivity in wireless networks
-
Birkhäuser, Boston
-
P. Gupta and P. R. Kumar, "Critical Power for Asymptotic Connectivity in Wireless Networks", in Stochastic Analysis, Control, Optimization and Applications, Birkhäuser, Boston, pp. 547-566, 1998.
-
(1998)
Stochastic Analysis, Control, Optimization and Applications
, pp. 547-566
-
-
Gupta, P.1
Kumar, P.R.2
-
8
-
-
14844314204
-
Location-aware key management scheme for wireless microsensor networks
-
D. Huang, M. Mehta, D. Medhi, and L. Harn, "Location-aware Key Management Scheme for Wireless Microsensor Networks", in Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 29-42, 2004.
-
(2004)
Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
9
-
-
85088342537
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks", in ACM CCS'03.
-
ACM CCS'03
-
-
Liu, D.1
Ning, P.2
-
10
-
-
0031287494
-
The longest edge of the random minimum spanning tree
-
M. D. Penrose, "The Longest Edge of the Random Minimum Spanning Tree", in The Annals of Applied Probability, Vol. 7, No. 2, pp. 340-361, 1997.
-
(1997)
The Annals of Applied Probability
, vol.7
, Issue.2
, pp. 340-361
-
-
Penrose, M.D.1
-
13
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", in ACM CCS'03.
-
ACM CCS'03
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|