-
2
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs, Cryptographic Technologies Group Trusted Information Systems, NAI Labs, The Security Research Division Network Associates, Inc. 3060 Washington Road (Rt. 97) Glenwood, MD 21738-9745
-
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and Approaches for Distributed Sensor Network Security. Technical Report 00-010, NAI Labs, Cryptographic Technologies Group Trusted Information Systems, NAI Labs, The Security Research Division Network Associates, Inc. 3060 Washington Road (Rt. 97) Glenwood, MD 21738-9745, 2000.
-
(2000)
Technical Report
, Issue.10
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
4
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Washington DC, USA, IEEE Computer Society
-
H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks. In Proceedings of the IEEE Symposium on Security and Privacy, pages 197-213, Washington DC, USA, 2003. IEEE Computer Society.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security, 8(2):228-258, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
8
-
-
14844314204
-
Locationaware key management scheme for wireless sensor networks
-
New York, NY, USA, ACM Press
-
nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 04), pages 29-42, New York, NY, USA, 2004, ACM Press.
-
(2004)
nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 04)
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
10
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
April 26-27, Barkley, California, USA
-
J. Newsome, E. Shi, D. Song and A. Perrig. The Sybil Attack in Sensor Networks: Analysis & Defenses. In IPSN 2004, pages 259-268, April 26-27, 2004, Barkley, California, USA.
-
(2004)
IPSN 2004
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
11
-
-
33750038340
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno. A. Perrig and V. Gligor. Distributed Detection of Node Replication Attacks in Sensor Networks. In IEEE S&P , 2005.
-
(2005)
IEEE S&P
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
12
-
-
0034771605
-
SPINS: Security protocols for sensor netowrks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Netowrks. In Mobile Computing and Networking, pages 189-199, 2001.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
13
-
-
33645692468
-
AES-based cryptographic and biometrie security coprocessor IC in 0.18-um CMOS resistant to side-channel power analysis attacks
-
June
-
K. Tiri, D. Hwang, A. Hodjat, B. C. Lai, S. Yang, P. Schaumont, and I. Verbauwhede. AES-Based Cryptographic and Biometrie Security Coprocessor IC in 0.18-um CMOS Resistant to Side-Channel Power Analysis Attacks. In Proceedings of the Symposia on VLSI Technology and Circuits, pages 216-219, June 2005.
-
(2005)
Proceedings of the Symposia on VLSI Technology and Circuits
, pp. 216-219
-
-
Tiri, K.1
Hwang, D.2
Hodjat, A.3
Lai, B.C.4
Yang, S.5
Schaumont, P.6
Verbauwhede, I.7
|