-
1
-
-
84883897746
-
-
gaurav jolly.Mustafa c.kuscu,pallavi kokate,and Mohamed younis,a low-energy key management protocol for wireless sensor networks, proceedings of eighth IEEE International symposium on computers and communication(ISCC03) IEEE 2003.
-
gaurav jolly.Mustafa c.kuscu,pallavi kokate,and Mohamed younis,"a low-energy key management protocol for wireless sensor networks, "proceedings of eighth IEEE International symposium on computers and communication(ISCC03) IEEE 2003.
-
-
-
-
2
-
-
0033357103
-
securing ad hoc networks
-
L.Zhou and Z.J.Haas,"securing ad hoc networks,"IEEE Network, vol. 13,no.6,pp.24-30,1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
3
-
-
38049065209
-
-
kyung hyune khee,young ho park, and gene tsudik,an architecture for key management in hierarchical mobile ad-hoc networks,journal of communications and networks.6,no.2,june 2004.
-
kyung hyune khee,young ho park, and gene tsudik,"an architecture for key management in hierarchical mobile ad-hoc networks,"journal of communications and networks.vol.6,no.2,june 2004.
-
-
-
-
4
-
-
0035789267
-
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proc. 2001 ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, pages 156-163. ACM Press, October 2001. ISBN 1-58113-428-2.
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proc. 2001 ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, pages 156-163. ACM Press, October 2001. ISBN 1-58113-428-2.
-
-
-
-
5
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
ACM Press, ISBN 1-58113-422-3
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar. SPINS: Security Protocols for Sensor Networks. In Proceedings of the 7th Ann. Int. Conf. on Mobile Computing and Networking, pages 189-199. ACM Press, 2001. ISBN 1-58113-422-3.
-
(2001)
Proceedings of the 7th Ann. Int. Conf. on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
6
-
-
0038341106
-
-
L. Eschenauer and V.D. Gligor. A key-management scheme for distributed sensor networks. In Proc. 9th ACM conference on Computer and communications security, pages 41-47. ACM Press, 2002. ISBN 1-58113-612-9.
-
L. Eschenauer and V.D. Gligor. A key-management scheme for distributed sensor networks. In Proc. 9th ACM conference on Computer and communications security, pages 41-47. ACM Press, 2002. ISBN 1-58113-612-9.
-
-
-
-
8
-
-
4544301464
-
Random key assignments for secure wireless sensor networks
-
ACM Press, October, ISBN 1-58113-783-4
-
R. Di Pietro, L.V. Mancini, and A. Mei. Random key assignments for secure wireless sensor networks. In 1st ACM Workshop on Security of Ad-hoc and Sensor Networks, pages 62-71. ACM Press, October 2003. ISBN 1-58113-783-4.
-
(2003)
1st ACM Workshop on Security of Ad-hoc and Sensor Networks
, pp. 62-71
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
10
-
-
0033877788
-
-
Wendi Rabiner Heinzelman, Anantha Chandrakasan and Hari Balakrishnan. Hawaaian Energy-Efficient Communication Protocols for Wireless Microsensor Networks (LEACH). Int'l Conf. on Systems Science, January 2000.
-
Wendi Rabiner Heinzelman, Anantha Chandrakasan and Hari Balakrishnan. Hawaaian "Energy-Efficient Communication Protocols for Wireless Microsensor Networks (LEACH)". Int'l Conf. on Systems Science, January 2000.
-
-
-
-
11
-
-
17944374430
-
A non-interactive protocol for member expansion in a secret sharing scheme
-
Dong P,Kuang xh,Lu XC,"A non-interactive protocol for member expansion in a secret sharing scheme,"Journal of software,2005,16(1):116- 120. http://www.ios.org.cn/1000-9825/16/116.htm
-
(2005)
Journal of software
, vol.16
, Issue.1
, pp. 116-120
-
-
Dong, P.1
Kuang xh, L.X.2
-
12
-
-
38049013520
-
-
FIPS 180-1. Secure Hash Standard (SHS), April 1995.
-
FIPS 180-1. Secure Hash Standard (SHS), April 1995.
-
-
-
-
13
-
-
38049083266
-
-
FIPS 180-2. Secure Hash Standard (SHS), August 2002.
-
FIPS 180-2. Secure Hash Standard (SHS), August 2002.
-
-
-
-
14
-
-
84937436045
-
Increasing the lifetime of a key: A comparitive analysis of the security of rekeying techniques
-
T. Okamoto, editor, Advances in Cryptology, ASIACRYPT 2000, of
-
M. Abdalla and M. Bellare. Increasing the lifetime of a key: A comparitive analysis of the security of rekeying techniques. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of LNCS, pages 546-565.
-
LNCS
, vol.1976
, pp. 546-565
-
-
Abdalla, M.1
Bellare, M.2
|