-
1
-
-
0013427153
-
Probabilistic methods in extremal finite set theory
-
ALON, N. 1991. Probabilistic methods in extremal finite set theory. In Extremal Problems for Finite Sets, 39-57.
-
(1991)
Extremal Problems for Finite Sets
, pp. 39-57
-
-
ALON, N.1
-
3
-
-
84893755647
-
Wireless integrated network sensors: Low-power systems on a chip
-
The Hague, The Netherlands
-
ASADA, G., DONG, M., LIN, T., NEWBERG, F., POTTIE, G., MARCY, H., AND KAISER, W. 1998. Wireless integrated network sensors: Low-power systems on a chip. In Proceedings of the 24th IEEE European Solid-State Circuits Conference (ESSCIRC'98). The Hague, The Netherlands, 9-12.
-
(1998)
Proceedings of the 24th IEEE European Solid-State Circuits Conference (ESSCIRC'98)
, pp. 9-12
-
-
ASADA, G.1
DONG, M.2
LIN, T.3
NEWBERG, F.4
POTTIE, G.5
MARCY, H.6
KAISER, W.7
-
5
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptology: Proceedings of the EUROCRYPT'84. Paris, France
-
BLOM, R. 1984. An optimal class of symmetric key generation systems. In Advances in Cryptology: Proceedings of the EUROCRYPT'84. Paris, France. Lecture Notes in Computer Science, vol. 209, 335-338.
-
(1984)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
BLOM, R.1
-
6
-
-
85028765277
-
Perfectlysecure key distribution for dynamic conferences
-
Advances in Cryptology: Proceedings of the CRYPTO'92. Santa Barbara, CA
-
BLUNDO, C., SANTIS, A. D., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1992. Perfectlysecure key distribution for dynamic conferences. In Advances in Cryptology: Proceedings of the CRYPTO'92. Santa Barbara, CA, Lecture Notes in Computer Science, vol. 740, 471-486.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
BLUNDO, C.1
SANTIS, A.D.2
HERZBERG, A.3
KUTTEN, S.4
VACCARO, U.5
YUNG, M.6
-
7
-
-
35348993814
-
-
CARMAN, D. W., KRUUS, P. S., AND MATT, B. J. 2000. Constraints and approaches for distributed sensor network security. Tech. rep. #00-010, NAI Labs.
-
CARMAN, D. W., KRUUS, P. S., AND MATT, B. J. 2000. Constraints and approaches for distributed sensor network security. Tech. rep. #00-010, NAI Labs.
-
-
-
-
8
-
-
35048867517
-
Combinatorial design of key distribution mechanisms for distributed sensor networks
-
Proceedings of the 9th European Symposium on Research in Computer Security ESORICS'04, Sophia Antipolis, France
-
ÇAMTEPE, S. A. AND YENER, B. 2004. Combinatorial design of key distribution mechanisms for distributed sensor networks. In Proceedings of the 9th European Symposium on Research in Computer Security (ESORICS'04). Sophia Antipolis, France. Lecture Notes in Computer Science, vol. 3193. 293-308.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 293-308
-
-
ÇAMTEPE, S.A.1
YENER, B.2
-
10
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA
-
CHAN, H., PERRIG, A., AND SONG, D. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 197-213.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
CHAN, H.1
PERRIG, A.2
SONG, D.3
-
12
-
-
4544301464
-
Random key assignment for secure wireless sensor networks
-
Fairfax, VA
-
DI PIETRO, R., MANCINI, L. V., AND MEI, A. 2003. Random key assignment for secure wireless sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03). Fairfax, VA, 62-71.
-
(2003)
Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03)
, pp. 62-71
-
-
DI PIETRO, R.1
MANCINI, L.V.2
MEI, A.3
-
13
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington, DC
-
DU, W., DENG, J., HAN, Y. S., AND VARSHNEY, P. K. 2003. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). Washington, DC, 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
DU, W.1
DENG, J.2
HAN, Y.S.3
VARSHNEY, P.K.4
-
14
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
Urbana-Champaign, IL
-
DU, W., WANG, R., AND NING, R 2005. An efficient scheme for authenticating public keys in sensor networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05). Urbana-Champaign, IL, 58-67.
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05)
, pp. 58-67
-
-
DU, W.1
WANG, R.2
NING, R.3
-
15
-
-
0029362456
-
On key storage in secure networks
-
DYER, M., FENNER, T., FRIEZE, A., AND THOMASON, A. 1995. On key storage in secure networks. J. Cryptol. 8, 189-200.
-
(1995)
J. Cryptol
, vol.8
, pp. 189-200
-
-
DYER, M.1
FENNER, T.2
FRIEZE, A.3
THOMASON, A.4
-
16
-
-
0000934255
-
Families of finite sets in which no set is covered by the union of two others
-
ERDÖS, P., FRANKL, P., AND FÜREDI, Z. 1982. Families of finite sets in which no set is covered by the union of two others. J. Combinat. Theory, Series A 33, 158-166.
-
(1982)
J. Combinat. Theory, Series A
, vol.33
, pp. 158-166
-
-
ERDÖS, P.1
FRANKL, P.2
FÜREDI, Z.3
-
17
-
-
51249175955
-
Families of finite sets in which no set is covered by the union of r others
-
ERDÖS, P., FRANKL, P., AND FÜREDI, Z. 1985. Families of finite sets in which no set is covered by the union of r others. Israel J. Math. 51, 1-2.
-
(1985)
Israel J. Math
, vol.51
, pp. 1-2
-
-
ERDÖS, P.1
FRANKL, P.2
FÜREDI, Z.3
-
19
-
-
0003421261
-
-
John Wiley and Sons, Inc, New York, NY
-
FELLER, W. 1957. An Introduction to Probability Theory and Its Applications, vol. 1. John Wiley and Sons, Inc., New York, NY
-
(1957)
An Introduction to Probability Theory and Its Applications
, vol.1
-
-
FELLER, W.1
-
20
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
Kauai, HI
-
GAUBATZ, G., KAPS, J. P., OZTURK, E., AND SUNAR, B. 2005. State of the art in ultra-low power public key cryptography for wireless sensor networks. In Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications (PerCom'05). Kauai, HI, 146-150.
-
(2005)
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications (PerCom'05)
, pp. 146-150
-
-
GAUBATZ, G.1
KAPS, J.P.2
OZTURK, E.3
SUNAR, B.4
-
21
-
-
0025212474
-
A matrix key distribution scheme
-
GONG, L. AND WHEELER, D. J. 1990. A matrix key distribution scheme. J Cryptol. 2, 1, 51-59.
-
(1990)
J Cryptol
, vol.2
, Issue.1
, pp. 51-59
-
-
GONG, L.1
WHEELER, D.J.2
-
22
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Kauai, HI
-
GUPTA, V., MILLARD, M., FUNG, S., ZHU, Y., GURA, N., EBERLE, H., AND SHANTZ, S. C. 2005. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications (PerCom'05). Kauai, HI, 247-256.
-
(2005)
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications (PerCom'05)
, pp. 247-256
-
-
GUPTA, V.1
MILLARD, M.2
FUNG, S.3
ZHU, Y.4
GURA, N.5
EBERLE, H.6
SHANTZ, S.C.7
-
23
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Cambridge, MA
-
GURA, N., PATEL, A., WANDER, A., EBERLE, H., AND SHANTZ, S. C. 2004. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of the 6th Workshop on Cryptographic Hardware and Embedded Systems (CHES'04). Cambridge, MA, 119-132.
-
(2004)
Proceedings of the 6th Workshop on Cryptographic Hardware and Embedded Systems (CHES'04)
, pp. 119-132
-
-
GURA, N.1
PATEL, A.2
WANDER, A.3
EBERLE, H.4
SHANTZ, S.C.5
-
24
-
-
0034445661
-
System architecture directions for networked sensors
-
Cambridge, MA
-
HILL, J., SZEWCZYK, R., WOO, A., HOLLAR, S., CULLER, D., AND PISTER, K. 2000. System architecture directions for networked sensors. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX). Cambridge, MA, 93-104.
-
(2000)
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
, pp. 93-104
-
-
HILL, J.1
SZEWCZYK, R.2
WOO, A.3
HOLLAR, S.4
CULLER, D.5
PISTER, K.6
-
25
-
-
35349026221
-
An elementary proof of inclusion-exclusion formulas
-
JOHNSON, B. R. 1980. An elementary proof of inclusion-exclusion formulas. Amer. Math. Month. 87, 9, 750-751.
-
(1980)
Amer. Math. Month
, vol.87
, Issue.9
, pp. 750-751
-
-
JOHNSON, B.R.1
-
26
-
-
24144503356
-
Deterministic key predistribution schemes for distributed sensor networks
-
Selected Areas in Cryptography SAC2004, Waterloo, Ontario, Canada
-
LEE, J. AND STINSON, D. R. 2004. Deterministic key predistribution schemes for distributed sensor networks. In Selected Areas in Cryptography (SAC2004). Waterloo, Ontario, Canada. Lecture Notes in Computer Science, vol. 3357, 294-307.
-
(2004)
Lecture Notes in Computer Science
, vol.3357
, pp. 294-307
-
-
LEE, J.1
STINSON, D.R.2
-
27
-
-
84949023663
-
Secret-key agreement without public-key cryptography
-
Advances in Cryptology: Proceedings of CRYPTO'93, Santa Barbara, CA
-
LEIGHTON, T. AND MICALI, S. 1993. Secret-key agreement without public-key cryptography. In Advances in Cryptology: Proceedings of (CRYPTO'93). Santa Barbara, CA. Lecture Notes in Computer Science, vol. 773, 456-479.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 456-479
-
-
LEIGHTON, T.1
MICALI, S.2
-
29
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
LIU, D., NING, P., AND LI, R. 2005. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Secur. 8, 1, 41-77.
-
(2005)
ACM Trans. Inform. Syst. Secur
, vol.8
, Issue.1
, pp. 41-77
-
-
LIU, D.1
NING, P.2
LI, R.3
-
31
-
-
0033471867
-
On k-connectivity for a geometric random graph
-
PENROSE, M. 1999. On k-connectivity for a geometric random graph. W. Rand. Struct. Algor. 15, 2, 145-164.
-
(1999)
W. Rand. Struct. Algor
, vol.15
, Issue.2
, pp. 145-164
-
-
PENROSE, M.1
-
33
-
-
0842289248
-
Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks
-
San Francisco, CA
-
RAMKUMAR, M., MEMON, N., AND SIMHA, R. 2003. Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks. In Proceedings of the IEEE Conference on Global Communications (GLOBECOM'03). San Francisco, CA, 1405-1409.
-
(2003)
Proceedings of the IEEE Conference on Global Communications (GLOBECOM'03)
, pp. 1405-1409
-
-
RAMKUMAR, M.1
MEMON, N.2
SIMHA, R.3
-
35
-
-
84943553152
-
Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
-
Atlanta, GA
-
ZHU, S., XU, S., SETIA, S., AND JAJODIA, S. 2003. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNF03). Atlanta, GA, 326-335.
-
(2003)
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNF03)
, pp. 326-335
-
-
ZHU, S.1
XU, S.2
SETIA, S.3
JAJODIA, S.4
|