-
2
-
-
84945327416
-
Xor macs: New methods for message authentication using finite pseudorandom functions
-
BELLARE, M., GUERIN, R., AND ROGAWAY, P. 1995. Xor macs: New methods for message authentication using finite pseudorandom functions. In Proceedings of CRYPTo'95.
-
(1995)
Proceedings of CRYPTo'95
-
-
BELLARE, M.1
GUERIN, R.2
ROGAWAY, P.3
-
3
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptology, Proceedings of EUROCRYPT84, Springer-Verlag, Berlin, Germany
-
BLOM, R. 1985. An optimal class of symmetric key generation systems. In Advances in Cryptology, Proceedings of EUROCRYPT84. Lecture Notes in Computer Science, vol. 209. Springer-Verlag, Berlin, Germany, 335-338.
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
BLOM, R.1
-
4
-
-
85028765277
-
Perfectlysecure key distribution for dynamic conferences
-
Advances in Cryptology, Proceedings of CRYPTO'92, Springer-Verlag, Berlin, Germany
-
BLUNDO, C., SANTIS, A. D., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1993. Perfectlysecure key distribution for dynamic conferences. In Advances in Cryptology, Proceedings of CRYPTO'92. Lecture Notes in Computer Science, vol. 740. Springer-Verlag, Berlin, Germany, 471-486.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
BLUNDO, C.1
SANTIS, A.D.2
HERZBERG, A.3
KUTTEN, S.4
VACCARO, U.5
YUNG, M.6
-
5
-
-
25844435733
-
Pike: Peer intermediaries for key establishment in sensor networks
-
CHAN, H. AND PERRIG, A. 2005. Pike: Peer intermediaries for key establishment in sensor networks. In Proceedings of Infocom'05.
-
(2005)
Proceedings of Infocom
, vol.5
-
-
CHAN, H.1
PERRIG, A.2
-
9
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
DU, W., DENG, J., HAN, Y., AND VARSHNEY, P. 2003. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
DU, W.1
DENG, J.2
HAN, Y.3
VARSHNEY, P.4
-
11
-
-
0022793132
-
How to construct random functions
-
Mach
-
GOLDREICH, O., GOLDWASSER, S., AND MICALI, S. 1986. How to construct random functions. J. Assoc. Comput. Mach. 33, 4, 210-217.
-
(1986)
J. Assoc. Comput
, vol.33
, Issue.4
, pp. 210-217
-
-
GOLDREICH, O.1
GOLDWASSER, S.2
MICALI, S.3
-
12
-
-
0034445661
-
System architecture directions for networked sensors
-
HILL, J., SZEWCZYK, R., WOO, A., HOLLAR, S., CULLER, D. E., AND PISTER, K. S. J. 2000. System architecture directions for networked sensors. In Proceedings of the Conference on Architectural Support for Programming Languages and Operating Systems. 93-104.
-
(2000)
Proceedings of the Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
HILL, J.1
SZEWCZYK, R.2
WOO, A.3
HOLLAR, S.4
CULLER, D.E.5
PISTER, K.S.J.6
-
16
-
-
0019634370
-
Password authentication with insecure communication communication
-
LAMPORT, L. 1981. Password authentication with insecure communication communication. Commun. ACM 24, 11, 770-772.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
LAMPORT, L.1
-
19
-
-
16644374371
-
-
LIU, D., NING, P., AND LI, R. 2005. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1 (Feb.), 1-77.
-
LIU, D., NING, P., AND LI, R. 2005. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1 (Feb.), 1-77.
-
-
-
-
20
-
-
0034771605
-
Spins: Security protocols for sensor netowrks
-
PERRIG, A., SZEWCZYK, R., WEN, V., CULLER, D. E., AND TYGAR, J. D. 2001. Spins: Security protocols for sensor netowrks. In Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom'01). 189-199.
-
(2001)
Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom'01)
, pp. 189-199
-
-
PERRIG, A.1
SZEWCZYK, R.2
WEN, V.3
CULLER, D.E.4
TYGAR, J.D.5
-
23
-
-
0036793924
-
-
WOOD, A. AND STANKOVIC, J. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10 (Oct.), 54-62.
-
WOOD, A. AND STANKOVIC, J. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10 (Oct.), 54-62.
-
-
-
-
25
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
YE, F., LUO, H., LU, S., AND ZHANG, L. 2004. Statistical en-route detection and filtering of injected false data in sensor networks. In Proceedings of IEEE Infocom'04.
-
(2004)
Proceedings of IEEE Infocom
, vol.4
-
-
YE, F.1
LUO, H.2
LU, S.3
ZHANG, L.4
-
26
-
-
34548452284
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
YI, Y., WANG, X., ZHU, S., AND CAO, G. 2006. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of ACM Mobihoc.
-
(2006)
Proceedings of ACM Mobihoc
-
-
YI, Y.1
WANG, X.2
ZHU, S.3
CAO, G.4
-
28
-
-
84943553152
-
Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
-
ZHU, S., XU, S., SETIA, S., AND JAJODIA, S. 2003b. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP'03).
-
(2003)
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP'03)
-
-
ZHU, S.1
XU, S.2
SETIA, S.3
JAJODIA, S.4
|