-
2
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
Los Alamitos, CA, 11-14 IEEE Computer Society
-
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of 2003 Symposium on Security and Privacy, pages 197-215, Los Alamitos, CA, 11-14 2003. IEEE Computer Society.
-
(2003)
Proceedings of 2003 Symposium on Security and Privacy
, pp. 197-215
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
March
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE Information Communications Conference (INFOCOM), March 2004.
-
(2004)
Proceedings of IEEE Information Communications Conference (INFOCOM)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
4
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
October
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), pages 42-51, October 2003.
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
7
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
October
-
D. Huang, M. Mehta, D. Medhi, and H. Lein. Location-aware key management scheme for wireless sensor networks. In Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pages 29-42, October 2004.
-
(2004)
Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Lein, H.4
-
8
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
13
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the Association for Computing Machinery, 36(2):335-348, 1989.
-
(1989)
Journal of the Association for Computing Machinery
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
15
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. SIAM Journal of Applied Math, 8:300-304, 1960.
-
(1960)
SIAM Journal of Applied Math
, vol.8
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
16
-
-
0017512185
-
On the complexity of decoding goppa codes
-
D. V. Sarwate. On the complexity of decoding goppa codes. IEEE Transactions on Information Theory, 23(4):515-516, 1977.
-
(1977)
IEEE Transactions on Information Theory
, vol.23
, Issue.4
, pp. 515-516
-
-
Sarwate, D.V.1
-
17
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
2342588224
-
Analysis of multipath routingpart i: The effect on the packet delivery ratio
-
A. Tsirigos and Z. J. Haas. Analysis of multipath routingpart i: The effect on the packet delivery ratio. IEEE Transactions on Wireless Communications, 3(1): 138-146, 2004.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.1
, pp. 138-146
-
-
Tsirigos, A.1
Haas, Z.J.2
|