-
1
-
-
8344262333
-
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE, 2004.
-
(2004)
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
2
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation System, in Advances in Cryptology - Eurocrypt84
-
R. Blom. An Optimal Class of Symmetric Key Generation System, in Advances in Cryptology - Eurocrypt84, LNCS vol. 209, p. 335-338, 1985.
-
(1985)
LNCS
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
3
-
-
84948984838
-
Space requirements for broadcast encryption, in Advances in Cryptology - Eurocrypt94
-
C. Blundo, and A. Cresti. Space requirements for broadcast encryption, in Advances in Cryptology - Eurocrypt94, LNCS vol. 950, p. 471-486, 1994.
-
(1994)
LNCS
, vol.950
, pp. 471-486
-
-
Blundo, C.1
Cresti, A.2
-
4
-
-
85028765277
-
-
C. Blundo, A. De Santi, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure Key Distribution for Dynamic Conferences, in Advances in Cryptogology - Crypto92, LNCS 740, p. 471-486, 1993.
-
C. Blundo, A. De Santi, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure Key Distribution for Dynamic Conferences, in Advances in Cryptogology - Crypto92, LNCS vol. 740, p. 471-486, 1993.
-
-
-
-
5
-
-
33646919610
-
Combinatorial Optimization for Key Management in Secure Multicast Environments
-
Kluwer Publishing
-
M. Eltoweissy, H. Heydari, L. Morales, and H. Sudborough, Combinatorial Optimization for Key Management in Secure Multicast Environments. Journal of Network and Ssytem Management, Kluwer Publishing, 2004.
-
(2004)
Journal of Network and Ssytem Management
-
-
Eltoweissy, M.1
Heydari, H.2
Morales, L.3
Sudborough, H.4
-
6
-
-
0037086890
-
-
I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,Wireless sensor networks:a survey. Computer Networks, 38:393-422, December. 2002.
-
I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,Wireless sensor networks:a survey. Computer Networks, 38:393-422, December. 2002.
-
-
-
-
8
-
-
34547320420
-
-
H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks, to appear in proc. IEEE Symposium of Privacy and Security 03, May 2003.
-
H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks, to appear in proc. IEEE Symposium of Privacy and Security 03, May 2003.
-
-
-
-
9
-
-
0035728669
-
-
B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang. Secure Group Communications for Wireless Networks, in proc. IEEE MILCOM01, Oct. 2001.
-
B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang. Secure Group Communications for Wireless Networks, in proc. IEEE MILCOM01, Oct. 2001.
-
-
-
-
11
-
-
0038341106
-
-
L. Eschenauer, and V. D. Gligor. A Key-Management Scheme for Distributed Sensor Networks, in proc. ACM CCS02, Nov. 2002.
-
L. Eschenauer, and V. D. Gligor. A Key-Management Scheme for Distributed Sensor Networks, in proc. ACM CCS02, Nov. 2002.
-
-
-
-
12
-
-
84979291225
-
Broadcast Encryption, in Advances in Cryptology - Crypto93
-
A. Fiat, and M. Naor. Broadcast Encryption, in Advances in Cryptology - Crypto93, LNCS vol. 773, p. 480-491, 1994.
-
(1994)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
13
-
-
1442334736
-
-
S. P. Griffin, B. T. DeCleene, L. R. Dondeti, R. M. Flynn, D. Kiwior, and A. Olbert. Hierarchical Key Management for Mobile Multicast Members, 2002.
-
(2002)
Hierarchical Key Management for Mobile Multicast Members
-
-
Griffin, S.P.1
DeCleene, B.T.2
Dondeti, L.R.3
Flynn, R.M.4
Kiwior, D.5
Olbert, A.6
-
14
-
-
84937435227
-
The LSD Broadcast Encryption Scheme, in Advances in Cryptology
-
LNCS
-
D. Halevy, and A. Shamir. The LSD Broadcast Encryption Scheme, in Advances in Cryptology - Crypto2002, LNCS vol. 2442, p. 47-60, 2002.
-
(2002)
Crypto2002
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
15
-
-
0141770051
-
Communication-efficient group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik. Communication-efficient group key agreement, in proc. IFIP SEC01, 2001.
-
(2001)
proc. IFIP
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
17
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. Needham, and M. Schroeder. Using Encryption for Authentication in Large Networks of Computers, in Commu. of ACM, vol. 21, no. 12, p. 993-999, 1978.
-
(1978)
Commu. of ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
18
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks, in proc. ACM MOBICOM 2001, July 2001.
-
(2001)
proc. ACM MOBICOM
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
19
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers, in Advances in Cryptology - Crypto01
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers, in Advances in Cryptology - Crypto01, LNCS vol. 2139, p. 41-62, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
|