-
2
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197-213 (2003)
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
26444474509
-
-
Choi, K.Y., Hwang, J.Y., Lee, D.H.: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 494-505. Springer, Heidelberg (2005)
-
Choi, K.Y., Hwang, J.Y., Lee, D.H.: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 494-505. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
8344262333
-
-
Du, W., Deng, J., Han, Y. S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM 04, pp. 586-597 (2004)
-
Du, W., Deng, J., Han, Y. S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM 04, pp. 586-597 (2004)
-
-
-
-
5
-
-
23244467182
-
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks
-
Du, W., Deng, J., Han, Y. S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security, 228-258 (2005)
-
(2005)
ACM Transactions on Information and System Security
, vol.228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
6
-
-
0038341106
-
-
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM CCS 02, pp. 41-47 (2002)
-
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM CCS 02, pp. 41-47 (2002)
-
-
-
-
7
-
-
23944459661
-
-
Gaubatz, G., Kaps, J., Sunar, B.: Public keys cryptography in sensor networks?revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, 3313, pp. 2-18. Springer, Heidelberg (2005)
-
Gaubatz, G., Kaps, J., Sunar, B.: Public keys cryptography in sensor networks?revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2-18. Springer, Heidelberg (2005)
-
-
-
-
8
-
-
35048818581
-
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C: Comparing elliptic curve cryptography and RSA on 8-bit CPUS. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 119-132. Springer, Heidelberg (2004)
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C: Comparing elliptic curve cryptography and RSA on 8-bit CPUS. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
-
-
-
9
-
-
1542286901
-
-
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key establishment protocols for self-organizing sensor networks. In: ACM WSNA 03, pp. 141-150 (2003)
-
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key establishment protocols for self-organizing sensor networks. In: ACM WSNA 03, pp. 141-150 (2003)
-
-
-
-
10
-
-
38049060925
-
-
IEEE Std. 802.15.4-2003, IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANS) (2003)
-
IEEE Std. 802.15.4-2003, IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANS) (2003)
-
-
-
-
11
-
-
16644374371
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security, 41-77 (2005)
-
(2005)
ACM Transactions on Information and System Security
, vol.41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
13
-
-
0036475666
-
A new traitor tracing
-
Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. E85-A(2), 481-484 (2002)
-
(2002)
IEICE Trans
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
14
-
-
20344381294
-
-
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: IEEE SECON 04, pp. 71-80 (2004)
-
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: IEEE SECON 04, pp. 71-80 (2004)
-
-
-
-
15
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: ACM/IEEE Internation Conference on Mobile Computing and Networking, pp. 189-199 (2001)
-
(2001)
ACM/IEEE Internation Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.D.5
-
16
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. of Cryptology 13, 361-396 (2000)
-
(2000)
J. of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
17
-
-
38049038116
-
-
Wander, A., Gura, N., Eberle, H., Gupta, V., Chang, S.: Energy analysis for publickey cryptography for wireless sensor networks. In: IEEE PERCOM 05 (2005)
-
Wander, A., Gura, N., Eberle, H., Gupta, V., Chang, S.: Energy analysis for publickey cryptography for wireless sensor networks. In: IEEE PERCOM 05 (2005)
-
-
-
-
18
-
-
14844304757
-
-
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: ACM SASN 04, pp. 59-64 (2004)
-
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: ACM SASN 04, pp. 59-64 (2004)
-
-
-
-
19
-
-
24944483778
-
-
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing sensor networks with location-based keys. In: IEEE WCNC 05, pp. 1909-1914 (2005)
-
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing sensor networks with location-based keys. In: IEEE WCNC 05, pp. 1909-1914 (2005)
-
-
-
-
20
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc
-
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks 24(2), 47-260 (2006)
-
(2006)
Networks
, vol.24
, Issue.2
, pp. 47-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
21
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks. IEEE JSAC, Special Issue on UWB Wireless Communications
-
Zhang, Y., Liu, W., Lou, W., Fang, Y., Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications 24(4), 829-835 (2006)
-
(2006)
Theory and Applications
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
Wu, D.5
|