-
1
-
-
0037086890
-
Wireless sensor networks: a survey
-
Akyildiz I.F., Su W., Sankarasubramaniam Y., and Cayirci E. Wireless sensor networks: a survey. Computer Networks 38 4 (2002) 393-422
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
33746668624
-
-
Crossbow Technology Incorporation. .
-
-
-
-
4
-
-
33746767511
-
-
J. Heinrich, Detecting a Bad Ran dom Number Generator, Technical Re-port:CDF/MEMO/STATISTICS/PUBLIC/6850, University of Pennsylvania, 2004.
-
-
-
-
5
-
-
0021819410
-
Deciphering a linear congruential encryption"
-
Knuth D.E. Deciphering a linear congruential encryption". IEEE Transactions on Information Theory 31 1 (1985) 49-52
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.1
, pp. 49-52
-
-
Knuth, D.E.1
-
6
-
-
0024303956
-
Inferring sequences produced by pseudo-random number generators
-
Boyar J. Inferring sequences produced by pseudo-random number generators. Journal of the ACM 36 1 (1989) 129-141
-
(1989)
Journal of the ACM
, vol.36
, Issue.1
, pp. 129-141
-
-
Boyar, J.1
-
7
-
-
0020271558
-
-
J.P. Plumstead (Boyar), Inferring a sequence generated by a linear congruence, in: Proceedings of the 23rd Annual IEEE Symposium on the Foundations of Computer Science, 1982, pp. 153-159.
-
-
-
-
8
-
-
0012168966
-
How to predict congruential generators
-
Krawczyk H. How to predict congruential generators. Journal of Algorithms 13 4 (1992) 527-545
-
(1992)
Journal of Algorithms
, vol.13
, Issue.4
, pp. 527-545
-
-
Krawczyk, H.1
-
9
-
-
84950827947
-
The efficient generation of cryptographic confusion sequences"
-
Ritter T. The efficient generation of cryptographic confusion sequences". Cryptologia 15 2 (1991) 81-139
-
(1991)
Cryptologia
, vol.15
, Issue.2
, pp. 81-139
-
-
Ritter, T.1
-
11
-
-
10044284351
-
-
S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington, DC, 2004, pp. 62-72.
-
-
-
-
12
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A., Szewczyk R., Wen V., Culler D., and Tygar J.D. SPINS: security protocols for sensor networks. ACM Wireless Networks 8 5 (2002) 521-534
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
13
-
-
28444433009
-
-
H. Chan, A. Perrig, D. Song, Random Key Predistribution Schemes for Sensor Networks, IEEE Security and Privacy, Oakland CA, 2003, pp. 197-213.
-
-
-
-
14
-
-
23244467182
-
A pairwise key pre-distribution scheme for wireless sensor networks"
-
Du W., Deng J., Han Y., and Varshney P. A pairwise key pre-distribution scheme for wireless sensor networks". ACM Transactions on Information and System Security (TISSEC) 8 2 (2005) 228-258
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
15
-
-
0038341106
-
-
L. Eschenauer, V. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington, DC, 2002, pp. 41-47.
-
-
-
-
16
-
-
3042822764
-
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington, DC, 2003, pp. 52-61.
-
-
-
-
17
-
-
84943553152
-
-
S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Ap proach, 11th IEEE International Conference on Network Protocols (ICNP), Atlanta, GA, 2003, pp. 326-335.
-
-
-
-
18
-
-
26444574670
-
-
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proceedings of the Second International Conference on Embedded networked Sensor Systems, Baltimore, MD, USA, pp. 162-175.
-
-
-
-
19
-
-
84948990100
-
-
R. Rivest, The RC5 Encryption Algorithm, in: Proceedings of the First Workshop on Fast Software Encryption, 1995, pp. 86-96.
-
-
-
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems"
-
Rivest R.L., Shamir A., and Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems". Communications of the ACM 21 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
23
-
-
0017018484
-
-
W. Diffie, M.E. Hellman, New directions in cryptography, in: IEEE Transaction on Information Theory, IT-22:644C654, 1976.
-
-
-
-
24
-
-
0003195066
-
The MD5 message-digest algorithm
-
Rivest R. The MD5 message-digest algorithm. IETF RFC 1321 (1992)
-
(1992)
IETF RFC
, vol.1321
-
-
Rivest, R.1
-
25
-
-
1542265638
-
US secure hash algorithm 1 (SHA1)
-
Eastlake D., and Jones P. US secure hash algorithm 1 (SHA1). IETF RFC 3174 (2001)
-
(2001)
IETF RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
26
-
-
33746668013
-
-
Skipjack and KEA algorithm specifications. , NIST, 1998.
-
-
-
-
27
-
-
33746758193
-
-
D. Liu, P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in: Proceedings of the 10th Network and Distributed System Security Symposium (NDSS'03), San Diego, CA, 2003, pp. 263-276.
-
-
-
-
28
-
-
33746757576
-
-
L. Hu, D. Evans, Secure Aggregation for Wireless Networks, Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, 2003.
-
-
-
-
31
-
-
51749087865
-
-
C.-C Li, B. Sun, Using linear congruential generators for cryptographic purposes, in: Proceedings of the 20th International Conference on Computers and Their Applications, New Orleans, LA, 2005.
-
-
-
-
32
-
-
33746720818
-
-
D. Carman, P. Kruus, B. Matt, Constraints and Approaches for Distributed Sensor Network Security, NAI Labs Technical Report No. 00010, 2000.
-
-
-
-
33
-
-
18844411823
-
-
J. Zhao,R. Govindan, Understanding Packet Delivery Performance In Dense Wireless Sensor Networks, in: Proceedings of the First International Conference on Embedded networked sensor systems (ACM Sensys'03), Los Angeles, CA, 2003, pp. 1-13.
-
-
-
-
34
-
-
20344370718
-
-
O. Gnawalix, M. Yarvisz, J. Heidemanny, Ramesh Govindan, Interaction of retransmission, blacklisting, and routing metrics for reliability in sensor network routing, in: The First IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON'04), Santa Clara, October 4-7, 2004, pp. 34-43.
-
-
-
-
35
-
-
0036980191
-
-
C.-Y Wan, A.T. Campbell, L. Krishnamurthy, PSFQ: a reliable transport protocol for wireless sensor networks, in: International Workshop on Wireless Sensor Networks and Applications (WSNA '02), Atlanta, GA, 2002, pp. 1-11.
-
-
-
-
37
-
-
84884730529
-
-
R. Blom, An Optimal Class of Symmetric Key Generation Schemes, Advance in Cryptography EUROCRYPT, 1985, Lecture Notes in Computer Science, Vol, 209, Springer-Verlag, 1985, pp. 335-338.
-
-
-
|