-
3
-
-
0029256120
-
Conference key distribution schemes for secure digital mobile communications
-
Hwang M.-S., and Yang W.-P. Conference key distribution schemes for secure digital mobile communications. IEEE J. Select. Areas Commun. 13 (1995) 416-420
-
(1995)
IEEE J. Select. Areas Commun.
, vol.13
, pp. 416-420
-
-
Hwang, M.-S.1
Yang, W.-P.2
-
4
-
-
0033343111
-
Dynamic participation in a secure conference scheme for mobile communications
-
Hwang M.-S. Dynamic participation in a secure conference scheme for mobile communications. IEEE Trans. Veh. Tech. 48 (1999) 1469-1474
-
(1999)
IEEE Trans. Veh. Tech.
, vol.48
, pp. 1469-1474
-
-
Hwang, M.-S.1
-
5
-
-
0035039150
-
Comments on dynamic participation in a secure conference scheme for mobile communications
-
Ng S.-L. Comments on dynamic participation in a secure conference scheme for mobile communications. IEEE Trans. Veh. Tech. 50 (2001) 334-335
-
(2001)
IEEE Trans. Veh. Tech.
, vol.50
, pp. 334-335
-
-
Ng, S.-L.1
-
6
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Hwang K.-F., and Chang C.-C. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans. Wireless Commun. 2 (2003) 400-407
-
(2003)
IEEE Trans. Wireless Commun.
, vol.2
, pp. 400-407
-
-
Hwang, K.-F.1
Chang, C.-C.2
-
8
-
-
85051072603
-
A self-encryption authentication protocol for teleconference services
-
Jiang Y., Lin C., Shi M., and Shen X. A self-encryption authentication protocol for teleconference services. Globecom (2005) 1706-1710
-
(2005)
Globecom
, pp. 1706-1710
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
9
-
-
0029359261
-
Techniques for privacy and authentication in personal communication system
-
Brown D. Techniques for privacy and authentication in personal communication system. IEEE Pers. Commun. Mag. 2 (1995) 6-10
-
(1995)
IEEE Pers. Commun. Mag.
, vol.2
, pp. 6-10
-
-
Brown, D.1
-
10
-
-
34548051147
-
-
Y. Jiang, C. Lin, M. Shi, X. Shen, Hash-binary-tree based group key distribution with time-limited node revocation, in: Y. Xiao, Y. Pan, (Eds.), Security in Distributed and Networking Systems, 2007.
-
-
-
-
11
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A.D., and Stankovic J.A. Denial of service in sensor networks. Computer 35 (2002) 54-62
-
(2002)
Computer
, vol.35
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
12
-
-
34548008420
-
-
N. Haller, The s/key one-time password system, RFC1760, IETF, 1995.
-
-
-
-
13
-
-
85177210565
-
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of IEEE/ACM MobiCom'01, pp. 189-199, 2001.
-
-
-
-
14
-
-
0033690336
-
-
A. Perrig, J.D. Tygar, D. Song, R. Canetti, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 56-65, 2000.
-
-
-
-
15
-
-
85000276942
-
Multilevel μTESLA: broadcast authentication for distributed sensor networks
-
Liu D., and Ning P. Multilevel μTESLA: broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3 (2004) 800-836
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
16
-
-
85016596484
-
LiSP: a lightweight security protocol for wireless sensor networks
-
Park T., and Shin K.G. LiSP: a lightweight security protocol for wireless sensor networks. ACM Trans. Embed. Comput. Syst. 3 (2004) 634-660
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
|