-
2
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM Press, New York
-
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communications Security (CCS), ACM, pp. 41-47. ACM Press, New York (2002)
-
(2002)
9th ACM Conference on Computer and Communications Security (CCS), ACM
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
3
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
S&P, pp, IEEE Computer Society Press, Los Alamitos
-
Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (S&P), pp. 197-213. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
4
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
ACM, New York
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: 10th ACM CCS, pp. 42-51. ACM, New York (2003)
-
(2003)
10th ACM CCS
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
5
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
ACM Press, New York
-
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM CCS, pp. 52-61. ACM Press, New York (2003)
-
(2003)
10th ACM CCS
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
6
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
ACM Press, New York
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM CCS, pp. 62-72. ACM Press, New York (2003)
-
(2003)
10th ACM CCS
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
7
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
IEEE Computer Society Press, Los Alamitos
-
Anderson, R.J., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: 12th IEEE International Conference on Network Protocols, IEEE Computer Society, pp. 206-215. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
12th IEEE International Conference on Network Protocols, IEEE Computer Society
, pp. 206-215
-
-
Anderson, R.J.1
Chan, H.2
Perrig, A.3
-
8
-
-
84947273682
-
The Sybil attack
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
9
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defenses
-
ACM Press, New York
-
Newsome, J., Shi, E., Song, D.X., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: 3rd International Symposium on Information Processing in Sensor Networks, pp. 259-268. ACM Press, New York (2004)
-
(2004)
3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.X.3
Perrig, A.4
-
10
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
IEEE Computer Society Press, Los Alamitos
-
Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In: IEEE S&P, IEEE Computer Society, pp. 49-63. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
IEEE S&P, IEEE Computer Society
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
11
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
IEEE Computer Society Press, Los Alamitos
-
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: 22nd IEEE INFOCOM, IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
22nd IEEE INFOCOM
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
84976295016
-
Distance-bounding protocols (extended abstract)
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
13
-
-
33847329743
-
An RFID distance bounding protocol. In: IEEE Secure Comm
-
Los Alamitos
-
Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: IEEE Secure Comm., pp. 67-73. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
IEEE Computer Society Press
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
14
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
ACM Press, New York
-
Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: 1st ACM Workshop on Security of ad hoc and Sensor Networks, pp. 21-32. ACM Press, New York (2003)
-
(2003)
1st ACM Workshop on Security of ad hoc and Sensor Networks
, pp. 21-32
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
ACM Press, New York
-
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking, pp. 255-265. ACM Press, New York (2000)
-
(2000)
6th International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
Chan, H., Gligor, V.D., Perrig, A., Muralidharan, G.: On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable Secure Computing 2(3), 233-247 (2005)
-
(2005)
IEEE Transactions on Dependable Secure Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
18
-
-
0001989185
-
A new family of authentication protocols
-
Anderson, R., Bergadano, F., Crispo, B., Lee, J.H., Manifavas, C., Needham, R.: A new family of authentication protocols. ACM SIGOPS Operating Systems Review (OSR) 32(4), 9-20 (1998)
-
(1998)
ACM SIGOPS Operating Systems Review (OSR)
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.H.4
Manifavas, C.5
Needham, R.6
-
19
-
-
33748079781
-
Suicide for the common good: A new strategy for credential revocation in self-organizing systems
-
Clulow, J., Moore, T.: Suicide for the common good: a new strategy for credential revocation in self-organizing systems. ACM SIGOPS OSR 40(3), 18-21 (2006)
-
(2006)
ACM SIGOPS OSR
, vol.40
, Issue.3
, pp. 18-21
-
-
Clulow, J.1
Moore, T.2
-
20
-
-
0033690336
-
-
Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Ecient authentication and signing of multicast streams over lossy channels. In: IEEE S&P, pp. 56-73. IEEE Computer Society Press, Los Alamitos (2000)
-
Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Ecient authentication and signing of multicast streams over lossy channels. In: IEEE S&P, pp. 56-73. IEEE Computer Society Press, Los Alamitos (2000)
-
-
-
-
21
-
-
84969346266
-
A certified digital signature
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
22
-
-
33746881477
-
Power consumption evaluation of efficient digital signature schemes for low power devices
-
IEEE Computer Society Press, Los Alamitos
-
Seys, S., Preneel, B.: Power consumption evaluation of efficient digital signature schemes for low power devices. In: IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, pp. 79-86. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
IEEE International Conference on Wireless And Mobile Computing, Networking And Communications
, pp. 79-86
-
-
Seys, S.1
Preneel, B.2
-
23
-
-
14744271851
-
The economics of resisting censorship
-
Danezis, G., Anderson, R.: The economics of resisting censorship. IEEE Security & Privacy 3(1), 45-50 (2005)
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 45-50
-
-
Danezis, G.1
Anderson, R.2
|