-
2
-
-
0017959977
-
Secure communication over insecure channels
-
R. Merkle, "Secure communication over insecure channels," Commun. ACM, vol. 21, no. 4, pp. 294-299, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.1
-
3
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Security and Privacy, 2003, p. 197.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach," in Proc. IEEE ICNP, 2003, p. 326.
-
(2003)
Proc. IEEE ICNP
, pp. 326
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
5
-
-
42449162962
-
Expander graph based key distribution mechanisms in wireless sensor networks
-
S. A. Camtepe, B. Yener, and M. Yung, "Expander graph based key distribution mechanisms in wireless sensor networks," in Proc. IEEE Int. Conf. Communication, 2006, pp. 2262-2267.
-
(2006)
Proc. IEEE Int. Conf. Communication
, pp. 2262-2267
-
-
Camtepe, S.A.1
Yener, B.2
Yung, M.3
-
6
-
-
84871442641
-
On communication security in wireless ad hoc sensor network
-
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava, "On communication security in wireless ad hoc sensor network," in Proc. IEEE WETICE, 2002, pp. 139-144.
-
(2002)
Proc. IEEE WETICE
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
7
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Proc. Advances in Cryptology (CRYPTO '92), 1992, pp. 471-486.
-
(1992)
Proc. Advances in Cryptology (CRYPTO '92)
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
8
-
-
3543050471
-
Efficient self-healing group key distribution with revocation capability
-
D. Liu, P. Ning, and K. Sun, "Efficient self-healing group key distribution with revocation capability," in Proc. ACM Conf. Computer and Communication Security, 2003, pp. 231-240.
-
(2003)
Proc. ACM Conf. Computer and Communication Security
, pp. 231-240
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
10
-
-
0000893265
-
An optimal class of symmetric key generation systems
-
R. Blom, "An optimal class of symmetric key generation systems," in Proc. EUROCRYPT, 1984, pp. 335-338.
-
(1984)
Proc. EUROCRYPT
, pp. 335-338
-
-
Blom, R.1
-
11
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in Proc. ACM Conf. Computer and Communication Security, 2003, pp. 42-51.
-
(2003)
Proc. ACM Conf. Computer and Communication Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
12
-
-
24144503356
-
Deterministic key pre-distribution schemes for distributed sensor networks
-
J. Lee and D. R. Stinson, "Deterministic key pre-distribution schemes for distributed sensor networks," in Proc. ACM Symp. Applied Computing, 2005, vol. LNCS 3357, pp. 294-307.
-
(2005)
Proc. ACM Symp. Applied Computing
, vol.LNCS
, Issue.3357
, pp. 294-307
-
-
Lee, J.1
Stinson, D.R.2
-
13
-
-
0000248498
-
A combinatorial approach to threshold schemes
-
D. R. Stinson and S. A. Vanstone, "A combinatorial approach to threshold schemes," SIAM J. Disc. Math., vol. 1, no. 2, pp. 230-236, 1988.
-
(1988)
SIAM J. Disc. Math
, vol.1
, Issue.2
, pp. 230-236
-
-
Stinson, D.R.1
Vanstone, S.A.2
-
14
-
-
0038452683
-
Combinatorial characterizations of authentication codes
-
D. R. Stinson, "Combinatorial characterizations of authentication codes," Designs, Codes and Cryptography, vol. 2, no. 2, pp. 175-187, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 175-187
-
-
Stinson, D.R.1
-
15
-
-
0005053804
-
Some new results on key distribution patterns and broadcast encryption
-
D. R. Stinson and T. van Trung, "Some new results on key distribution patterns and broadcast encryption," Designs, Codes and Cryptography no. 14, pp. 261-279, 1998.
-
(1998)
Designs, Codes and Cryptography
, Issue.14
, pp. 261-279
-
-
Stinson, D.R.1
van Trung, T.2
-
16
-
-
0031338514
-
Combinatorial design of congestion free networks
-
Dec
-
B. Yener, Y. Ofek, and M. Yung, "Combinatorial design of congestion free networks," IEEE/ACM Trans. Networking, vol. 5, no. 6, pp. 989-1000, Dec. 1997.
-
(1997)
IEEE/ACM Trans. Networking
, vol.5
, Issue.6
, pp. 989-1000
-
-
Yener, B.1
Ofek, Y.2
Yung, M.3
-
17
-
-
0037419930
-
Combinatorial design of multi-ring networks with combined routing and flow control
-
Y. Song, A. Wool, and B. Yener, "Combinatorial design of multi-ring networks with combined routing and flow control," Elsevier J. Comput. Netw., vol. 3, no. 3, pp. 247-267, 2003.
-
(2003)
Elsevier J. Comput. Netw
, vol.3
, Issue.3
, pp. 247-267
-
-
Song, Y.1
Wool, A.2
Yener, B.3
-
18
-
-
34247224664
-
-
Rensselaer Polytechnic Inst, Comput. Sci. Dept, Troy, NY, Tech. Rep. TR-05-07
-
S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: A survey," Rensselaer Polytechnic Inst., Comput. Sci. Dept., Troy, NY, Tech. Rep. TR-05-07, 2005.
-
(2005)
Key distribution mechanisms for wireless sensor networks: A survey
-
-
Camtepe, S.A.1
Yener, B.2
-
19
-
-
24944550584
-
A combinatorial approach to key predistribution for distributed sensor networks
-
J. Lee and D. R. Stinson, "A combinatorial approach to key predistribution for distributed sensor networks," in Proc. IEEE WCNC 2005, pp. 1200-1205.
-
(2005)
Proc. IEEE WCNC
, pp. 1200-1205
-
-
Lee, J.1
Stinson, D.R.2
-
24
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks," in Proc. Network and Distributed System Security Symp., 2003, pp. 263-276.
-
(2003)
Proc. Network and Distributed System Security Symp
, pp. 263-276
-
-
Liu, D.1
Ning, P.2
-
25
-
-
34247238095
-
-
Oct, Online, Available
-
L. Storme, P. Govaerts, J. D. Beule, and P. Lemens, Projective Geometries (pg) Share Package for gap4. Oct. 2004 [Online]. Available: http://cage.rug.ac.be/~jdebeule/pg/
-
(2004)
Projective Geometries (pg) Share Package for gap4
-
-
Storme, L.1
Govaerts, P.2
Beule, J.D.3
Lemens, P.4
|