-
1
-
-
0035789267
-
Secure pebblenets
-
New York, NY, USA, ACM Press
-
Stefano Basagni, Kris Herrin, Danilo Bruschi, and Emilia Rosti. Secure pebblenets. In MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pages 150-163, New York, NY, USA, 2001. ACM Press.
-
(2001)
MobiHoc '01: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 150-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
2
-
-
18844420431
-
Forward-security in private-key cryptography
-
Report 2001/035
-
Mihir Bellare and Bennet Yee. Forward-security in private-key cryptography. Cryptology ePrint Archive, Report 2001/035, 2001.
-
(2001)
Cryptology EPrint Archive
-
-
Bellare, M.1
Yee, B.2
-
3
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
New York, NY, USA, ACM Press
-
Laurent Eschenauer and Virgil D. Gligor. A key-management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 41-47, New York, NY, USA, 2002. ACM Press.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
4
-
-
33745847572
-
Epidemic-style monitoring in large-scale sensor networks
-
Vrije Universiteit Amsterdam, March
-
Daniela Gavidia, Spyros Voulgaris, and Maarten van Steen. Epidemic-style monitoring in large-scale sensor networks. Technical Report IR-CS-012.05, Vrije Universiteit Amsterdam, March 2005. http://www.cs.vu.nl/pub/papers/globe/IR-CS-012.05.pdf.
-
(2005)
Technical Report
, vol.IR-CS-012.05
-
-
Gavidia, D.1
Voulgaris, S.2
Van Steen, M.3
-
5
-
-
0034445661
-
System architecture directions for networked sensors
-
New York, NY, USA, ACM Press
-
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. System architecture directions for networked sensors. In ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pages 93-104, New York, NY, USA, 2000. ACM Press.
-
(2000)
ASPLOS-IX: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
6
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
F. Hu and N. Sharma. Security considerations in ad hoc sensor networks. Ad Hoc Networks, 3(1):69-89, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.1
, pp. 69-89
-
-
Hu, F.1
Sharma, N.2
-
7
-
-
2442549672
-
Seken (secure and efficient key exchange for sensor networks)
-
Kamran Jamshaid and Loreu Schwiebert. Seken (secure and efficient key exchange for sensor networks). In Performance, Computing, and Communications, 2004 IEEE International Conference on, pages 415-422, 2004.
-
(2004)
Performance, Computing, and Communications, 2004 IEEE International Conference on
, pp. 415-422
-
-
Jamshaid, K.1
Schwiebert, L.2
-
8
-
-
17644390287
-
Towards a new paradigm for securing wireless sensor networks
-
New York, NY, USA, ACM Press
-
K. Jones, A. Wadaa, S. Olariu, L. Wilson, and M. Eltoweissy. Towards a new paradigm for securing wireless sensor networks. In NSPW '03: Proceedings of the 2003 workshop on New security paradigms, pages 115-121, New York, NY, USA, 2003. ACM Press.
-
(2003)
NSPW '03: Proceedings of the 2003 Workshop on New Security Paradigms
, pp. 115-121
-
-
Jones, K.1
Wadaa, A.2
Olariu, S.3
Wilson, L.4
Eltoweissy, M.5
-
9
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
New York, NY, USA, ACM Press
-
Chris Karlof, Naveen Sastry, and David Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 162-175, New York, NY, USA, 2004. ACM Press.
-
(2004)
SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
10
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
February
-
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication, February 1997. RFC 2104.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
11
-
-
1542267055
-
Assessing security-critical energy-efficient sensor networks
-
University of Twente, The Netherlands, July
-
Y. W. Law, S. Dulman, S. Etalle, and P. Havinga. Assessing security-critical energy-efficient sensor networks. Technical Report TR-CTIT-02-18, University of Twente, The Netherlands, July 2002. http://purl.Org/utwente//38381.
-
(2002)
Technical Report
, vol.TR-CTIT-02-18
-
-
Law, Y.W.1
Dulman, S.2
Etalle, S.3
Havinga, P.4
-
12
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
Donggang Liu, Peng Ning, and Rongfang Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1):41-77, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
13
-
-
84944878354
-
-
CRC Press, Inc., Boca Raton, FL, USA
-
Alfred J. Menezes, Scott A. Vanstone, and Paul C. Van Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Van Oorschot, P.C.3
-
14
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
MIT, MA, USA, November
-
Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita. Cryptographic approach to "privacy-friendly" tags. In RFID Privacy Workshop, MIT, MA, USA, November 2003.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
15
-
-
4243082091
-
Security in wireless sensor networks
-
Adrian Perrig, John Stankovic, and David Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
16
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler, Spins: security protocols for sensor networks. Wirel. Netw., 8(5):521-534, 2002.
-
(2002)
Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
17
-
-
4344567712
-
Kerberos assisted authentication in mobile ad-hoc networks
-
Darlinghurst, Australia, Australia, Australian Computer Society, Inc.
-
Asad Amir Pirzada and Chris McDonald. Kerberos assisted authentication in mobile ad-hoc networks. In CRPIT '04: Proceedings of the 27th conference on Australasian computer science, pages 41-46, Darlinghurst, Australia, Australia, 2004. Australian Computer Society, Inc.
-
(2004)
CRPIT '04: Proceedings of the 27th Conference on Australasian Computer Science
, pp. 41-46
-
-
Pirzada, A.A.1
McDonald, C.2
-
18
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
New York, NY, USA, ACM Press
-
Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, and Niraj K. Jha. Analyzing the energy consumption of security protocols. In ISLPED '03: Proceedings of the 2003 international symposium on Low power electronics and design, pages 30-35, New York, NY, USA, 2003. ACM Press.
-
(2003)
ISLPED '03: Proceedings of the 2003 International Symposium on Low Power Electronics and Design
, pp. 30-35
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
19
-
-
18844368499
-
Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis
-
New York, NY, USA, ACM Press
-
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander Dean, Prank Mueller, and Mihail Sichitiu. Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In CASES '03: Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems, pages 188-197, New York, NY, USA, 2003. ACM Press.
-
(2003)
CASES '03: Proceedings of the 2003 International Conference on Compilers, Architecture and Synthesis for Embedded Systems
, pp. 188-197
-
-
Venugopalan, R.1
Ganesan, P.2
Peddabachagari, P.3
Dean, A.4
Mueller, P.5
Sichitiu, M.6
-
20
-
-
33745165448
-
Finding collisions in the full SHA-1
-
Shandong University, Shandong, China, June
-
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding collisions in the full SHA-1. Technical report, Shandong University, Shandong, China, June 2005.
-
(2005)
Technical Report
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
21
-
-
14344260955
-
Robust key establishment in sensor networks
-
Yongge Wang. Robust key establishment in sensor networks. SIGMOD Rec., 33(1):14-19, 2004.
-
(2004)
SIGMOD Rec.
, vol.33
, Issue.1
, pp. 14-19
-
-
Wang, Y.1
|