-
1
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, D.C., USA, Nov.
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in Proc. of the 9th ACM Conference on Computer and Communications Security (CCS'02), Washington, D.C., USA, Nov. 2002, pp. 41-47.
-
(2002)
Proc. of the 9th ACM Conference on Computer and Communications Security (CCS'02)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
2
-
-
28444433009
-
Random key pre-distribution schemes for sensor networks
-
Orland, Florida, USA, Jan.
-
H. Chan, A. Perrig, and D. Song, "Random key pre-distribution schemes for sensor networks," in Proc. of 2003 IEEE Symposium on Research in Security and Privacy, Orland, Florida, USA, Jan. 2003.
-
(2003)
Proc. of 2003 IEEE Symposium on Research in Security and Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
Washington, D.C., USA, Oct.
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in Proc. of the 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, D.C., USA, Oct. 2003, pp. 42-51.
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
4
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, D.C., USA, Oct.
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks." in Proc. of the 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, D.C., USA, Oct. 2003. pp. 52-61.
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
5
-
-
33745438469
-
Replication attack on random key pre-disiribution schemes for wireless sensor networks
-
Available Upon Request, Mar.
-
H. Fu, S. Kawamura, M. Zhang, and L. Zhang, "Replication attack on random key pre-disiribution schemes for wireless sensor networks," Available Upon Request, Information Assurance and Security Lab Tech. Rep. #05-001, Mar. 2005.
-
(2005)
Information Assurance and Security Lab Tech. Rep. #05-001
, vol.5
, Issue.1
-
-
Fu, H.1
Kawamura, S.2
Zhang, M.3
Zhang, L.4
-
7
-
-
0010461175
-
Constraints and approaches for distributed sensor security
-
Network Associates, Inc., Glenwood, MD
-
D. Carman, P. Kruus, and B. Matt, "Constraints and approaches for distributed sensor security," Network Associates, Inc., Glenwood, MD, NAI Labs Tech. Rep. #00-010, 2000.
-
(2000)
NAI Labs Tech. Rep. #00-010
, Issue.10
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
8
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "Spins: Security protocols for sensor networks," Journal of Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Journal of Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
9
-
-
4243082091
-
Security in wirelss sensor networks
-
June
-
A. Perrig, R. Szewczyk, and D. Wagner, "Security in wirelss sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Szewczyk, R.2
Wagner, D.3
-
10
-
-
0003237987
-
The kerberos network authentication service (v5)
-
J. Kohl and B. Neuman, "The kerberos network authentication service (v5)," RFC 1510, 1993.
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Neuman, B.2
-
11
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, vol. 21, no. 12, pp. 993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
12
-
-
0002380073
-
Tamper resistance - A cautionary note
-
Oakland, CA, USA, Nov.
-
R. Anderson and M. Kuhn, 'Tamper resistance - a cautionary note," in Proc. of the Second USENIX Workshop on Electronic Commerce, Oakland, CA, USA, Nov. 1996, pp. 1-11.
-
(1996)
Proc. of the Second USENIX Workshop on Electronic Commerce
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
13
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
Paris, France. Apr.
-
_, "Low cost attacks on tamper resistant devices," in Proc. of the 5th Int. Workshop LNCS 1361, Paris, France. Apr. 1997, pp. 125-136.
-
(1997)
Proc. of the 5th Int. Workshop LNCS
, vol.1361
, pp. 125-136
-
-
-
14
-
-
85093467807
-
Design principles for tamper-resistant smartcard processors
-
Chicago, Illinois, USA. May 10-11
-
O. Kömmerling and M. Kuhn, "Design principles for tamper-resistant smartcard processors," in Proc. of the USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA. May 10-11, 1999, pp. 9-20.
-
(1999)
Proc. of the USENIX Workshop on Smartcard Technology
, pp. 9-20
-
-
Kömmerling, O.1
Kuhn, M.2
|