-
3
-
-
35248891000
-
Forward-security in private-key cryptography
-
Lecture Notes in Computer Science, M. Joye ed, Springer-Verlag
-
M. Bellare and B. Yee. Forward-security in private-key cryptography. In Topics in Cryptology - CT-RSA '03, volume 2612. Lecture Notes in Computer Science, M. Joye ed, Springer-Verlag, 2003.
-
(2003)
Topics in Cryptology - CT-RSA '03
, vol.2612
-
-
Bellare, M.1
Yee, B.2
-
4
-
-
85084161952
-
Pgp in constrained wireless devices
-
August
-
M. Brown, D. Cheung, D. Hankerson, J. L. Hernandez, M. Kirkup, and A. Menezes. Pgp in constrained wireless devices. In 9th USENIX Security Symposium, August 2000.
-
(2000)
9th USENIX Security Symposium
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.L.4
Kirkup, M.5
Menezes, A.6
-
10
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
March
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE INFOCOM'04, March 2004.
-
(2004)
Proceedings of the IEEE INFOCOM'04
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
11
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
October
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communication Security, pages 42-51, October 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
17
-
-
0035704362
-
Providing robust and ubiquitous security support for wireless mobile networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L, Zhang. Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks, In Ninth Intimation Conference on Network Protocols (ICNP'01), pages 251-260, 2001.
-
(2001)
Ninth Intimation Conference on Network Protocols (ICNP'01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
22
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
A. Perrig, R, Szewczyk, V. Wen, D. Culler, and J.D.Tygar. Spins: Security protocols for sensor networks. In Wireless Networks Journal(WINET), September 2002.
-
(2002)
Wireless Networks Journal(WINET)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
25
-
-
4544244334
-
Sia: Secure information aggregation in sensor networks
-
November
-
B. Przydatek, D. Song, and A. Perrig. Sia: Secure information aggregation in sensor networks. In ACM SenSys, November 2003.
-
(2003)
ACM SenSys
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
26
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-013, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-1013
-
-
Shamir, A.1
-
27
-
-
1542325468
-
Location tracking in a wireless sensor network by mobile agents and its data fusion strategies
-
Y.-C. Tseng, S.-P. Kuo, H.-W. Lee, and C.-F. Huang. Location tracking in a wireless sensor network by mobile agents and its data fusion strategies, In Information Processing in Sensor Networks; Second Internatinal Workshop, IPSN 2003, 2003.
-
(2003)
Information Processing in Sensor Networks; Second Internatinal Workshop, IPSN 2003
-
-
Tseng, Y.-C.1
Kuo, S.-P.2
Lee, H.-W.3
Huang, C.-F.4
-
28
-
-
14344260955
-
Robust key establishment in sensor networks
-
March
-
Y. Wang. Robust key establishment in sensor networks. In SIGMOD Record, March 2004.
-
(2004)
SIGMOD Record
-
-
Wang, Y.1
|