-
1
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
0010461175
-
-
NAI Lab, Glenwood, MD, Tech. Rep. 00-010, Sep
-
D. W. Carman, P. S. Kruus, and B. J. Matt, "Constraints and approaches for distributed sensor network security", NAI Lab., Glenwood, MD, Tech. Rep. 00-010, Sep. 2000.
-
(2000)
Constraints and approaches for distributed sensor network security
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
3
-
-
36248963056
-
data security perspectives
-
S. S. Iyengar and R. R. Brooks, Eds. Boca Raton, FL: Chapman & Hall
-
D. W. Carman, "Chapter 30 data security perspectives," in Distributed Sensor Networks, S. S. Iyengar and R. R. Brooks, Eds. Boca Raton, FL: Chapman & Hall, 2005.
-
(2005)
Distributed Sensor Networks
-
-
Carman, D.W.1
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. 2003 IEEE Symp. Secur. Privacy, May 2003, pp. 197-213.
-
(2003)
Proc. 2003 IEEE Symp. Secur. Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
0142103313
-
Security and privacy in sensor networks
-
Oct
-
H. Chan and A. Perrig, "Security and privacy in sensor networks," IEEE Comput. Mag., vol. 36, no. 10, pp. 103-105, Oct. 2003.
-
(2003)
IEEE Comput. Mag
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
8
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Jul
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, Jul. 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
9
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. Hang, and P. K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in Proc. 10th ACM Conf. Comput. Commun. Secur, 2003, pp. 42-51.
-
(2003)
Proc. 10th ACM Conf. Comput. Commun. Secur
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Hang, Y.3
Varshney, P.K.4
-
10
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proc. 10th ACM Conf. Comput. Commun. Secur, Washington, DC, 2003, pp. 52-61.
-
(2003)
Proc. 10th ACM Conf. Comput. Commun. Secur
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
11
-
-
14844335004
-
Revisiting random key predistribution schemes for wireless sensor networks
-
J. Hwang and Y. Kim, "Revisiting random key predistribution schemes for wireless sensor networks," in Proc. 2nd ACM Workshop Secur. ad hoc Sens. Netw., 2004, pp. 43-52.
-
(2004)
Proc. 2nd ACM Workshop Secur. ad hoc Sens. Netw
, pp. 43-52
-
-
Hwang, J.1
Kim, Y.2
-
12
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
D. Huang, M. Mehra, D. Mehdi, and L. Ham, "Location-aware key management scheme for wireless sensor networks," in Proc. 2nd ACM Workshop Secur. ad hoc Sens. Netw., 2004, pp. 29-42.
-
(2004)
Proc. 2nd ACM Workshop Secur. ad hoc Sens. Netw
, pp. 29-42
-
-
Huang, D.1
Mehra, M.2
Mehdi, D.3
Ham, L.4
-
13
-
-
14844295528
-
Connectivity properties of secure wireless sensor networks
-
R. DiPietro, L. V. Mancini, A. Mei, A. Panconesi, and J. Radhakrishnan, "Connectivity properties of secure wireless sensor networks," in Proc. 2nd ACM Workshop Secur. ad hoc Sens. Netw., 2004, pp. 53-58.
-
(2004)
Proc. 2nd ACM Workshop Secur. ad hoc Sens. Netw
, pp. 53-58
-
-
DiPietro, R.1
Mancini, L.V.2
Mei, A.3
Panconesi, A.4
Radhakrishnan, J.5
-
15
-
-
10844235700
-
Tracking multiple targets with self-organizing distributed ground sensors
-
Aug
-
R. R. Brooks, D. Friedlander, J. Koch, and S. Phoha, "Tracking multiple targets with self-organizing distributed ground sensors," J. Parallel Distrib. Comput., vol. 64, no. 7, pp. 874-884, Aug. 2004.
-
(2004)
J. Parallel Distrib. Comput
, vol.64
, Issue.7
, pp. 874-884
-
-
Brooks, R.R.1
Friedlander, D.2
Koch, J.3
Phoha, S.4
-
17
-
-
33745486852
-
-
S. S. Iyengar and R. R. Brooks, Eds, Boca Raton, FL: Chapman & Hall
-
S. S. Iyengar and R. R. Brooks, Eds., Distributed Sensor Networks. Boca Raton, FL: Chapman & Hall, 2005.
-
(2005)
Distributed Sensor Networks
-
-
-
18
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perring, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. 2005 IEEE Symp. Secur. Privacy Conf., 2005, pp. 49-63.
-
(2005)
Proc. 2005 IEEE Symp. Secur. Privacy Conf
, pp. 49-63
-
-
Parno, B.1
Perring, A.2
Gligor, V.3
-
19
-
-
34547416271
-
Network embedded support for sensor network security,
-
M.S. thesis, Holcombe Dept. Elect. Comput. Eng, Clemson Univ, Clemson, SC, May
-
B. Pillai, "Network embedded support for sensor network security," M.S. thesis, Holcombe Dept. Elect. Comput. Eng., Clemson Univ., Clemson, SC, May 2006.
-
(2006)
-
-
Pillai, B.1
-
20
-
-
33645753048
-
Routing on a curve
-
Jan
-
B. Nath and D. Niculescu, "Routing on a curve," ACM SIGCOMM Comput. Commun. Rev., vol. 33, no. 1, pp. 155-160, Jan. 2003.
-
(2003)
ACM SIGCOMM Comput. Commun. Rev
, vol.33
, Issue.1
, pp. 155-160
-
-
Nath, B.1
Niculescu, D.2
-
21
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defense
-
Apr
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defense," in Proc. IEEE Conf. Inf. Process. Sensor Netw., Apr. 2004.
-
(2004)
Proc. IEEE Conf. Inf. Process. Sensor Netw
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
22
-
-
0004081447
-
-
Princeton, NJ: Princeton Univ. Press
-
D. Watts, Small Worlds. Princeton, NJ: Princeton Univ. Press, 1999.
-
(1999)
Small Worlds
-
-
Watts, D.1
|