-
1
-
-
84937436045
-
Increasing the lifetime of a key: A comparative analysis of the security of rekeying techniques
-
T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, Springer-Verlag
-
M. Abdalla and M. Bellare. Increasing the lifetime of a key: A comparative analysis of the security of rekeying techniques. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of LNCS, pages 546-565. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 546-565
-
-
Abdalla, M.1
Bellare, M.2
-
2
-
-
0035789267
-
Secure pebblenets
-
ACM Press, October
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of the 2001 ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, pages 156-163. ACM Press, October 2001.
-
(2001)
Proceedings of the 2001 ACM Int. Symp. on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
3
-
-
85084161952
-
PGP in Constrained Wireless Devices
-
USENIX Association, Aug
-
M. Brown, D. Cheung, D. Hankerson, J. L. Hernandez, M. Kirkup, and A. Menezes. PGP in Constrained Wireless Devices. In 9th USENIX Security Symposium, pages 247-261. USENIX Association, Aug 2000.
-
(2000)
9th USENIX Security Symposium
, pp. 247-261
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.L.4
Kirkup, M.5
Menezes, A.6
-
6
-
-
84958742278
-
An improved constraint-based system for the verification of security protocols
-
M. Hermenegildo and G. Puebla, editors, Madrid, Spain, Sep Springer-Verlag
-
R. Corin and S. Etalle. An improved constraint-based system for the verification of security protocols. In M. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symp. (SAS), volume 2477, pages 326-341, Madrid, Spain, Sep 2002. Springer-Verlag.
-
(2002)
9th Int. Static Analysis Symp. (SAS)
, vol.2477
, pp. 326-341
-
-
Corin, R.1
Etalle, S.2
-
7
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
USENIX Association, To appear
-
S.A. Crosby and D.S. Wallach. Denial of service via algorithmic complexity attacks. In 12th USENIX Security Symposium. USENIX Association, 2003. To appear.
-
(2003)
12th USENIX Security Symposium
-
-
Crosby, S.A.1
Wallach, D.S.2
-
8
-
-
4544290017
-
Secure selective exclusion in ad hoc wireless network
-
M.A. Ghonaimy, M.T. El-Hadidi, and H.K. Asian, editors, Kluwer Academic Publishers
-
R. di Pietro, L.V. Mancini, and S. Jajodia. Secure selective exclusion in ad hoc wireless network. In M.A. Ghonaimy, M.T. El-Hadidi, and H.K. Asian, editors, Security in the Information Society: Visions and Perspectives, pages 423-434. Kluwer Academic Publishers, 2002.
-
(2002)
Security in the Information Society: Visions and Perspectives
, pp. 423-434
-
-
Di Pietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
9
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
Boston, Massachusetts, United States, ACM Press
-
C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In 6th Annual Int. Conf. on Mobile Computing and Networking (MobiCOM '00), pages 56-67, Boston, Massachusetts, United States, 2000. ACM Press.
-
(2000)
6th Annual Int. Conf. on Mobile Computing and Networking (MobiCOM '00)
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
10
-
-
35248857083
-
On the security of CTR + CBC MAC
-
K. Nyberg and H.Heys, editors, Selected Areas in Cryptography, 9th Annual Workshop (SAC 2002), Springer-Verlag
-
J. Jonsson. On the security of CTR + CBC MAC. In K. Nyberg and H.Heys, editors, Selected Areas in Cryptography, 9th Annual Workshop (SAC 2002), volume 2595 of LNCS, pages 76-93. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2595
, pp. 76-93
-
-
Jonsson, J.1
-
11
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. Self-securing ad hoc wireless networks. In 7th IEEE Symp. on Computers and Communications, pages 567-574, 2002.
-
(2002)
7th IEEE Symp. on Computers and Communications
, pp. 567-574
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
12
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
ACM Press
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar. SPINS: Security Protocols for Sensor Networks. In Proceedings of the 7th Ann. Int. Conf. on Mobile Computing and Networking, pages 189-199. ACM Press, 2001.
-
(2001)
Proceedings of the 7th Ann. Int. Conf. on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
13
-
-
84943263539
-
-
Datasheet
-
RF Monolithics, Inc. TR1001: 868.35 MHz Transceiver. Datasheet, http://www.rfm.com/products/data/tr1001.pdf.
-
TR1001: 868.35 MHz Transceiver
-
-
-
14
-
-
84871442641
-
On communication security in wireless ad-hoc sensor networks
-
Jun
-
S. Slijepcevic, V. Tsiatsis, S. Zimbeck, M.B. Srivastava, and M. Potkonjak. On communication security in wireless ad-hoc sensor networks. In 11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 139-144, Jun 2002.
-
(2002)
11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 139-144
-
-
Slijepcevic, S.1
Tsiatsis, V.2
Zimbeck, S.3
Srivastava, M.B.4
Potkonjak, M.5
|