-
1
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Mihir Bellare, Joe Kilian, and Phillip Rogaway, The security of the cipher block chaining message authentication code, J. Comput. Syst. Sci. 61(3) (2000) 362-399.
-
(2000)
J. Comput. Syst. Sci
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
2
-
-
84903595110
-
Differential cryptanalysis of des-like cryptosystems
-
Springer-Verlag, London, UK
-
Eli Biham and Adi Shamir, Differential cryptanalysis of des-like cryptosystems, in: CRYPTO'90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK, 1991, pp. 2-21.
-
(1991)
CRYPTO'90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Washington, DC, USA
-
Haowen Chan, Adrian Perrig, and Dawn Song, Random key predistribution schemes for sensor networks, in: SP'03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, 2003, pp. 197.
-
(2003)
SP'03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM Press, New York, NY, USA
-
Laurent Eschenauer and Virgil D. Gligor, A key-management scheme for distributed sensor networks. in: CCS'02: Proceedings of the 9th ACM conference on computer and communications security, ACM Press, New York, NY, USA, 2002, pp. 41-47.
-
(2002)
CCS'02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
5
-
-
0032218225
-
How to prove where you are: Tracking the location of customer equipment
-
ACM Press, New York, NY, USA
-
Eran Gabber and Avishai Wool, How to prove where you are: tracking the location of customer equipment, in: CCS'98: Proceedings of the 5th ACM conference on computer and communications security, ACM Press, New York, NY, USA, 1998, pp. 142-149.
-
(1998)
CCS'98: Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 142-149
-
-
Gabber, E.1
Wool, A.2
-
6
-
-
1542316037
-
The nesc language: A holistic approach to networked embedded systems
-
ACM Press, New York, NY, USA
-
David Gay, Philip Levis, Robert von Behren, Matt Welsh, Eric Brewer, and David Culler, The nesc language: A holistic approach to networked embedded systems, in: PLDI'03: Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation, ACM Press, New York, NY, USA, 2003, pp. 1-11.
-
(2003)
PLDI'03: Proceedings of the ACM SIGPLAN 2003 conference on Programming Language Design and Implementation
, pp. 1-11
-
-
Gay, D.1
Levis, P.2
von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
7
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet (best paper)
-
Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, and Sheueling Chang Shantz, Sizzle: A standards-based end-to-end security architecture for the embedded internet (best paper). in: PerCom, 2005, pp. 247-256.
-
(2005)
PerCom
, pp. 247-256
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
8
-
-
0034445661
-
System architecture directions for networked sensors
-
ACM Press, New York, NY, USA
-
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister, System architecture directions for networked sensors, in: ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, ACM Press, New York, NY, USA, 2000, pp. 93-104.
-
(2000)
ASPLOS-IX: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
9
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
ACM Press, New York, NY, USA
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: MobiCom'02: Proceedings of the 8th annual international conference on Mobile computing and networking, ACM Press, New York, NY, USA, 2002, pp. 12-23.
-
(2002)
MobiCom'02: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
10
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
ACM Press
-
C. Karlof, N. Sastry, and D. Wagner, Tinysec: a link layer security architecture for wireless sensor networks, in: SenSys'04: Proceedings of the 2nd international conference on Embedded networked sensor systems, ACM Press, 2004, pp. 162-175.
-
(2004)
SenSys'04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
12
-
-
84955573096
-
How to protect des against exhaustive key search
-
Springer-Verlag, London, UK
-
Joe Kilian and Phillip Rogaway, How to protect des against exhaustive key search, in: CRYPTO'96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK, 1996, pp. 252-267.
-
(1996)
CRYPTO'96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
, pp. 252-267
-
-
Kilian, J.1
Rogaway, P.2
-
13
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
ACM Press, New York, NY, USA
-
Donggang Liu and Peng Ning, Location-based pairwise key establishments for static sensor networks, in: SASN'03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, ACM Press, New York, NY, USA, 2003, pp. 72-82.
-
(2003)
SASN'03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 72-82
-
-
Liu, D.1
Ning, P.2
-
14
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
October
-
David J. Malan, Matt Welsh, and Michael D. Smith, A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, in: SECON04: First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, October 2004, pp. 59-64.
-
(2004)
SECON04: First IEEE International Conference on Sensor and Ad Hoc Communications and Networks
, pp. 59-64
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
15
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
Mitsuru Matsui, Linear cryptanalysis method for des cipher, in: EUROCRYPT'93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, Springer-Verlag New York, Inc., Secaucus, NJ, USA, 1994, pp. 386-397.
-
(1994)
EUROCRYPT'93: Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology
, pp. 386-397
-
-
Matsui, M.1
-
16
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
ACM Press, New York, NY, USA,
-
Celal Ozturk, Yanyong Zhang, and Wade Trappe, Source-location privacy in energy-constrained sensor network routing, in: SASN'04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM Press, New York, NY, USA, 2004, pp. 88-93.
-
(2004)
SASN'04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
17
-
-
4243082091
-
Security in wireless sensor networks
-
Adrian Perrig, John Stankovic, and David Wagner, Security in wireless sensor networks, Commun. ACM 47(6) (2004) 53-57.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
18
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler, Spins: security protocols for sensor networks, Wirel. Netw. 8(5) (2002) 521-534.
-
(2002)
Wirel. Netw
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
19
-
-
4544301464
-
Random key-assignment for secure wireless sensor networks
-
ACM Press, New York, NY, USA
-
Roberto Di Pietro, Luigi V. Mancini, and Alessandro Mei, Random key-assignment for secure wireless sensor networks, in: SASN'03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, ACM Press, New York, NY, USA, 2003, pp. 62-71.
-
(2003)
SASN'03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 62-71
-
-
di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
20
-
-
18844457825
-
Sia: Secure information aggregation in sensor networks
-
ACM Press, New York, NY, USA
-
Bartosz Przydatek, Dawn Song, and Adrian Perrig, Sia: secure information aggregation in sensor networks, in: SenSys'03: Proceedings of the 1st international conference on Embedded networked sensor systems, ACM Press, New York, NY, USA, 2003, pp. 255-265.
-
(2003)
SenSys'03: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
21
-
-
1542317849
-
Secure verification of location claims
-
ACM Press, New York, NY, USA
-
Naveen Sastry, Umesh Shankar, and David Wagner, Secure verification of location claims, in: WiSe'03: Proceedings of the 2003 ACM workshop on Wireless security, ACM Press, New York, NY, USA, 2003, pp. 1-10.
-
(2003)
WiSe'03: Proceedings of the 2003 ACM Workshop on Wireless Security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
22
-
-
14844300164
-
Resilient aggregation in sensor networks
-
ACM Press, New York, NY, USA
-
David Wagner, Resilient aggregation in sensor networks, in: SASN'04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM Press, New York, NY, USA, 2004, pp. 78-87.
-
(2004)
SASN'04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 78-87
-
-
Wagner, D.1
-
23
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
ACM Press, New York, NY, USA
-
Ronald Watro, Derrick Kong, Sue fen Cuti, Charles Gardiner, Charles Lynn, and Peter Kruus, Tinypk: securing sensor networks with public key technology, in: SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM Press, New York, NY, USA, 2004, pp. 59-64.
-
(2004)
SASN'04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
24
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
Fan Ye, Haiyun Luo, Songwu Lu, and Lixia Zhang, Statistical en-route filtering of injected false data in sensor networks, in: IEEE Proceedings of INFOCOM 2004, 2004, pp. 839-850.
-
(2004)
IEEE Proceedings of INFOCOM 2004
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
|