-
1
-
-
84887300122
-
XOR MACs: New methods for message authentication using finite pseudo-random functions
-
M. Bellare, R. Guerin, and P. Rogaway. XOR MACs: New Methods for Message Authentication Using Finite Pseudo-random Functions. in Proc. of Crypto'95.
-
Proc. of Crypto'95
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
3
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptology, EUROCRYPT'84
-
R. Blom. An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology, EUROCRYPT'84, LNCS 209, 335338, 1984.
-
(1984)
LNCS
, vol.209
, pp. 335338
-
-
Blom, R.1
-
4
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Advances in Cryptology CRYPTO 92, pages 471486
-
C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology CRYPTO 92, LNCS 740, pages 471486, 1993.
-
(1993)
LNCS
, vol.740
-
-
Blundo, C.1
Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington DC, October 27-31
-
W. Du, J. Deng, Y. Han, and P. Varshney. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In Proc. of 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, October 27-31, 2003.
-
(2003)
Proc. of 10th ACM Conference on Computer and Communications Security (CCS)
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
8
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. Journal of the ACM, Vol. 33, No. 4, 1986, pp 210-217.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szevvczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors. In Proc. of ASPLOS IX, 2000.
-
(2000)
Proc. of ASPLOS IX
-
-
Hill, J.1
Szevvczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
13
-
-
0019634370
-
Password authentication with insecure communication communication
-
Nov.
-
L. Lamport. Password authentication with insecure communication communication. Communications of the ACM, 24(11):770-772, Nov., 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
17
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome Italy, July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security Protocols for Sensor Networks. In Proc. of Seventh Annual ACM International Conference on Mobile Computing and Networks(Mobicom 2001), Rome Italy, July 2001.
-
(2001)
Proc. of Seventh Annual ACM International Conference on Mobile Computing and Networks(Mobicom 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
18
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
To appear in
-
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. To appear in Proc. of IEEE INFOCOM 2004.
-
(2004)
Proc. of IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
20
-
-
58049185983
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
Dept. of Information and Software Engineering, George Mason University, March
-
S. Zhu, S. Setia, S. Jajodia and P. Ning. An Interleaved Hop-by-hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. Technical Report, Dept. of Information and Software Engineering, George Mason University, March 2004.
-
(2004)
Technical Report
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|