-
1
-
-
0027589399
-
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
-
May
-
M. J. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters, 29(11):999-1001, May 1993.
-
(1993)
Electronics Letters
, vol.29
, Issue.11
, pp. 999-1001
-
-
Beller, M.J.1
Yacobi, Y.2
-
2
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
R. Blom. An optimal class of symmetric key generation systems. In Proc. of EuroCrypt '84, pages 335-338, 1984.
-
(1984)
Proc. of EuroCrypt '84
, pp. 335-338
-
-
Blom, R.1
-
3
-
-
85028765277
-
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Crypto '92, pages 471-486, 1992.
-
(1992)
Crypto '92, Perfectly-secure key distribution for dynamic conferences
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
1542317846
-
An authentication framework for hierarchical ad hoc sensor networks
-
San Diego, CA, Sep
-
M. Bohge and W. Trappe. An authentication framework for hierarchical ad hoc sensor networks. In Proc. of WiSE '03, pages 79-87, San Diego, CA, Sep. 2003.
-
(2003)
Proc. of WiSE '03
, pp. 79-87
-
-
Bohge, M.1
Trappe, W.2
-
5
-
-
0010461175
-
Constraints and approaches for distributed sensor network security. TR No. 00-010, NAI Labs, Glenwood, MD
-
Sep
-
D. Carman, P. Kruus, and B. Matt. Constraints and approaches for distributed sensor network security. TR No. 00-010, NAI Labs, Glenwood, MD, Sep. 2000.
-
(2000)
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
6
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
Miami, FL, March
-
H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In Proc. of INFOCOM 2005, volume 1, pages 524-535, Miami, FL, March 2005.
-
(2005)
Proc. of INFOCOM 2005
, vol.1
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
7
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, CA, May
-
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proc. of IEEE SSP, pages 197-213, Berkeley, CA, May 2003.
-
(2003)
Proc. of IEEE SSP
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
34548796607
-
-
Crossbow. MPR/MIB Users Manual. Crossbow Technology, Inc., San José, CA, USA, A edition, Sep. 2005.
-
Crossbow. MPR/MIB Users Manual. Crossbow Technology, Inc., San José, CA, USA, A edition, Sep. 2005.
-
-
-
-
9
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Hong Kong, PR China, Mar
-
W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proc. of INFOCOM '04, volume 1, pages 586-597, Hong Kong, PR China, Mar. 2004.
-
(2004)
Proc. of INFOCOM '04
, vol.1
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
10
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
Washington, D.C, USA, Oct
-
W. Du, J. Deng, Y. Han, and P. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In Proc. of CCS '03, pages 42-51, Washington, D.C., USA, Oct. 2003.
-
(2003)
Proc. of CCS '03
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
11
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA, Nov
-
L. Eschenauer and V. Gligor. A key-management scheme for distributed sensor networks. In Proc. of CCS '02, pages 41-47, Washington, DC, USA, Nov. 2002.
-
(2002)
Proc. of CCS '02
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
12
-
-
0022793132
-
How to construct random functions
-
Oct
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792-807, Oct. 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
0033877788
-
Energy-efficient communication protocol for wireless microsensor networks
-
Maui, Hawaii, USA, Jan
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In Proc. of HICSS '00, volume 2, page 10, Maui, Hawaii, USA, Jan. 2000.
-
(2000)
Proc. of HICSS '00
, vol.2
, pp. 10
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
14
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
Washington DC, USA, Oct
-
D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key management scheme for wireless sensor networks. In Proc. of SASN '04, pages 29-42, Washington DC, USA, Oct. 2004.
-
(2004)
Proc. of SASN '04
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
15
-
-
24944463915
-
Cluster-based routing in wireless sensor networks: Issues and challenges
-
San José, CA, July
-
J. Ibriq and I. Mahgoub. Cluster-based routing in wireless sensor networks: Issues and challenges. In Proc. of SPECTS '04, pages 759-766, San José, CA, July 2004.
-
(2004)
Proc. of SPECTS '04
, pp. 759-766
-
-
Ibriq, J.1
Mahgoub, I.2
-
16
-
-
33745933645
-
A key predistribution scheme for secure sensor networks using probability density function of node deployment
-
Alexandria, VA, Nov
-
T. Ito, H. Ohta, N. Matsuda, and T. Yoneda. A key predistribution scheme for secure sensor networks using probability density function of node deployment. In Proc. of SASN '05, pages 69-75, Alexandria, VA, Nov. 2005.
-
(2005)
Proc. of SASN '05
, pp. 69-75
-
-
Ito, T.1
Ohta, H.2
Matsuda, N.3
Yoneda, T.4
-
17
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Anchorage, Alaska, May
-
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proc. of SNPA '03, pages 113-127, Anchorage, Alaska, May 2003.
-
(2003)
Proc. of SNPA '03
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
-
18
-
-
38949180258
-
Scalable session key construction protocol for wireless sensor networks
-
Austin, TX, USA, Dec
-
B. Lai, S. Kim, and I. Verbauwhede. Scalable session key construction protocol for wireless sensor networks. In IEEE Workshop on LARTES '02, Austin, TX, USA, Dec. 2002.
-
(2002)
IEEE Workshop on LARTES '02
-
-
Lai, B.1
Kim, S.2
Verbauwhede, I.3
-
19
-
-
24144503356
-
Deterministic key predistribution schemes for distributed sensor networks
-
Waterloo, Canada, Aug
-
J. Lee and D. R. Stinson. Deterministic key predistribution schemes for distributed sensor networks. In Proc. of SAC '04, pages 294-307, Waterloo, Canada, Aug. 2004.
-
(2004)
Proc. of SAC '04
, pp. 294-307
-
-
Lee, J.1
Stinson, D.R.2
-
20
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
San Diago, CA, USA, Feb
-
D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proc. of the 10th NDSSS, San Diago, CA, USA, Feb. 2003.
-
(2003)
Proc. of the 10th NDSSS
-
-
Liu, D.1
Ning, P.2
-
21
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
Fairfax, VA, USA, Oct
-
D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In Proc. of SASN '03, pages 72-82, Fairfax, VA, USA, Oct. 2003.
-
(2003)
Proc. of SASN '03
, pp. 72-82
-
-
Liu, D.1
Ning, P.2
-
22
-
-
33749033368
-
Group-based key predistribution in wireless sensor networks
-
Cologne, Germany, Sep
-
D. Liu, P. Ning, and W. Du. Group-based key predistribution in wireless sensor networks. In Proc. of WiSe '05, pages 11-20, Cologne, Germany, Sep. 2005.
-
(2005)
Proc. of WiSe '05
, pp. 11-20
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
23
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
Feb
-
D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security, 8(1):41-77, Feb. 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
24
-
-
34548809242
-
-
I. Mahgoub and M. Ilyas, editors, CRC Press, Boca Raton, FL
-
I. Mahgoub and M. Ilyas, editors. Sensor Network Protocols. CRC Press, Boca Raton, FL, 2006.
-
(2006)
Sensor Network Protocols
-
-
-
25
-
-
85051446702
-
-
I. Mahgoub and M. Ilyas, editors, CRC Press, Boca Raton, FL
-
I. Mahgoub and M. Ilyas, editors. SMART DUST: Sensor Network Applications, Architecture, and Design. CRC Press, Boca Raton, FL, 2006.
-
(2006)
SMART DUST: Sensor Network Applications, Architecture, and Design
-
-
-
26
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Comm. of the ACM, 21(12):993-999, Dec. 1978.
-
(1978)
Comm. of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
27
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sep
-
B. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38, Sep. 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'o, T.2
-
28
-
-
0023247970
-
Efficient and timely mutual authentication
-
Jan
-
D. Otway and O. Rees. Efficient and timely mutual authentication. Operating Systems Review, 21(1):8-10, Jan. 1987.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
29
-
-
85016596484
-
LiSP: A lightweight security protocol for wireless sensor networks
-
Aug
-
T. Park and K. Shin. LiSP: A lightweight security protocol for wireless sensor networks. Transactions on Embedded Computing Systems (TECS), 3(3):634-660, Aug. 2004.
-
(2004)
Transactions on Embedded Computing Systems (TECS)
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.2
-
30
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Communications of the ACM, 47(6):53-57, June 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
31
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, Jul
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security protocols for sensor networks. In Proc. of MobiCom '01, pages 189-199, Rome, Italy, Jul. 2001.
-
(2001)
Proc. of MobiCom '01
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
32
-
-
34548790227
-
Secure hash standard. Technical Report, TR No. FIPS PUBS 180-2, National Institute of Standards and Technology, Springfield, VA
-
August
-
F. PUBS. Secure hash standard. Technical Report, TR No. FIPS PUBS 180-2, National Institute of Standards and Technology, Springfield, VA, August 2002.
-
(2002)
-
-
PUBS, F.1
-
34
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Washington, DC, USA, Oct
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. TinyPK: Securing sensor networks with public key technology. In Proc. of SASN '04, pages 59-64, Washington, DC, USA, Oct. 2004.
-
(2004)
Proc. of SASN '04
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
35
-
-
33646400365
-
Efficient key establishment for group-based wireless sensor deployments
-
Sep
-
L. Zhou, J. Ni, and C. Ravishankar. Efficient key establishment for group-based wireless sensor deployments. In Proc. of WiSe '05, pages 1-10, Sep. 2005.
-
(2005)
Proc. of WiSe '05
, pp. 1-10
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.3
-
36
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington, DC, USA, Oct
-
S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proc. of ACM CCS '03, pages 62-72, Washington, DC, USA, Oct. 2003.
-
(2003)
Proc. of ACM CCS '03
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|