-
1
-
-
33744921035
-
Security instantiation in ad-hoc networks
-
A Preliminary Version Appears in Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS), June 2004, Florence, Italy.
-
Sandeep S. Kulkarni, Mohamed G. Gouda, and Anish Arora. Security instantiation in ad-hoc networks. Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks, 2005. A Preliminary Version Appears in Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS), June 2004, Florence, Italy.
-
(2005)
Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks
-
-
Kulkarni, S.S.1
Gouda, M.G.2
Arora, A.3
-
2
-
-
0025212474
-
A matrix key-distribution scheme
-
Li Gong and David J. Wheeler. A matrix key-distribution scheme. Journal of Cryptology, 2(1):51-59, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.1
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
3
-
-
0035704362
-
Providing robust and ubiqutious security support for mobile ad-hoc networks
-
J. Kong, P. Zefros, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiqutious security support for mobile ad-hoc networks. IEEE International Conference on Network Protocols, 2001.
-
(2001)
IEEE International Conference on Network Protocols
-
-
Kong, J.1
Zefros, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
5
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6), 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.2
-
7
-
-
30344435127
-
Design of secure end-to-end protocols for mobile systems
-
V. Varadharajan and Y. Mu. Design of secure end-to-end protocols for mobile systems. Wireless, 1996.
-
(1996)
Wireless
-
-
Varadharajan, V.1
Mu, Y.2
-
8
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of ACM, 21:993-999, 1978.
-
(1978)
Communications of ACM
, vol.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
11
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Conference on Computer and Communications Security (CCS), pages 42-51, 2003.
-
(2003)
ACM Conference on Computer and Communications Security (CCS)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
14
-
-
85028765277
-
Perfectly secure key distribution for dynamic conferences
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly secure key distribution for dynamic conferences. Advances in Cryptology, pages 344-355, 1992.
-
(1992)
Advances in Cryptology
, pp. 344-355
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
15
-
-
84884730529
-
An optimal class of key generation systems
-
Advances in Cryptology -Eurocrypt '84
-
R.Blom. An optimal class of key generation systems. Lecture Notes in Computer Science, pages 335-338, 1984. Advances in Cryptology -Eurocrypt '84.
-
(1984)
Lecture Notes in Computer Science
, pp. 335-338
-
-
Blom, R.1
|