-
2
-
-
35048818581
-
-
N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, in: Proceedings of the Sixth Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), Cambridge, MA, USA, 2004, pp. 119-132.
-
-
-
-
3
-
-
33646569085
-
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, S.C. Shantz, Sizzle: a standards-based end-to-end security architecture for the embedded internet, in: Proceedings of the Third IEEE Conference on Pervasive Computing and Communications (PerCom'05), Kauai, HI, USA, 2005, pp. 247-256.
-
-
-
-
4
-
-
0038341106
-
-
L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of the Ninth ACM Conference on Computer and Communications Security (CCS'02), Washington, DC, USA, 2002, pp. 41-47.
-
-
-
-
5
-
-
28444433009
-
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2003, pp. 197-213.
-
-
-
-
6
-
-
3042783638
-
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, DC, USA, 2003, pp. 42-51.
-
-
-
-
7
-
-
3042822764
-
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, DC, USA, 2003, pp. 52-61.
-
-
-
-
8
-
-
85163599229
-
-
M. Ramkumar, N. Memon, R. Simha, Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks, in: Proceedings of the IEEE Conference on Global Communications (GLOBECOM'03), San Francisco, CA, USA, 2003, pp. 1405-1409.
-
-
-
-
9
-
-
18144411997
-
-
M. Ramkumar, N. Memon, An efficient random key pre-distribution scheme, in: Proceedings of the IEEE Conference on Global Communications (GLOBECOM'04), Dallas, TX, USA, 2004, pp. 2218-2223.
-
-
-
-
11
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
Du W., Deng J., Han Y.S., Varshney P.K., Katz J., and Khalili A. A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security 8 2 (2005) 228-258
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
12
-
-
84886490515
-
-
P. Tague, R. Poovendran, A general probabilistic model for improving key assignment in wireless networks, in: Proceedings of the Fourth International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'06), Boston, MA, USA, 2006.
-
-
-
-
13
-
-
84884730529
-
-
R. Blom, An optimal class of symmetric key generation systems, in: Advances in Cryptology: Proceedings of the EUROCRYPT'84, LNCS 209, Paris, France, 1984, pp. 335-338.
-
-
-
-
14
-
-
85028765277
-
-
C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, Perfectly-secure key distribution for dynamic conferences, in: Advances in Cryptology: Proceedings of the CRYPTO'92, LNCS 740, Santa Barbara, CA, USA, 1992, pp. 471-486.
-
-
-
-
15
-
-
84949023663
-
-
T. Leighton, S. Micali, Secret-key agreement without public-key cryptography, in: Advances in Cryptology: Proceedings of the CRYPTO'93, LNCS 773, Santa Barbara, CA, USA, 1993, pp. 456-479.
-
-
-
-
16
-
-
35048867517
-
-
S.A. Çamtepe, B. Yener, Combinatorial design of key distribution mechanisms for distributed sensor networks, in: Proceedings of the Ninth European Symposium on Research in Computer Security (ESORICS'04), LNCS 3193, Sophia Antipolis, France, 2004, pp. 293-308.
-
-
-
-
17
-
-
24944550584
-
-
J. Lee, D.R. Stinson, A combinatorial approach to key predistribution for distributed sensor networks, in: Proceedings of the IEEE Wireless Communication and Networking Conference (WCNC'05), Los Angeles, CA, USA, 2005, pp. 1200-1205.
-
-
-
-
18
-
-
25844435733
-
-
H. Chan, A. Perrig, PIKE: Peer intermediaries for key establishment in sensor networks, in: Proceedings of the 24th Conference of the IEEE Communications Society (INFOCOM'05), Miami, FL, USA, 2005, pp. 524-535.
-
-
-
-
19
-
-
34248390697
-
-
F. Stajano, R. Anderson, The resurrecting ducking: Security issues for ad-hoc wireless networks, in: Proceedings of the Seventh Annual International Workshop on Security Protocols, Cambridge, UK, 1999, pp. 172-194.
-
-
-
-
20
-
-
85177238197
-
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D. Culler, SPINS: Security protocols for sensor networks, in: Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom'01), Rome, Italy, 2001, pp. 189-199.
-
-
-
-
22
-
-
14844314204
-
-
D. Huang, M. Mehta, D. Medhi, L. Harn, Location-aware key management scheme for wireless sensor networks, in: Proceedings of the Second ACM Workshop on Security of Ad-Hoc and Sensor Networks (SASN'04), Washington, DC, USA, 2004, pp. 29-42.
-
-
-
-
23
-
-
27544460282
-
-
B. Parno, A. Perrig, V. Gligor, Distributed detection of node replication attacks in sensor networks, in: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2005.
-
-
-
-
26
-
-
0000951232
-
Worst-case analysis of greedy heuristics for integer programming with nonnegative data
-
Dobson G. Worst-case analysis of greedy heuristics for integer programming with nonnegative data. Mathematics of Operations Research 7 4 (1982) 515-531
-
(1982)
Mathematics of Operations Research
, vol.7
, Issue.4
, pp. 515-531
-
-
Dobson, G.1
-
30
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM 22 11 (1979) 612-613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|