-
1
-
-
34247325635
-
An Efficient Broadcast Authentication Scheme in Wirless Sensor Networks
-
March
-
Chang, S., Shieh, S., Lin, W., Hsieh, C.: An Efficient Broadcast Authentication Scheme in Wirless Sensor Networks. In: Proc. ASIACCS06, pp. 311-320 (March 2006)
-
(2006)
Proc. ASIACCS06
, pp. 311-320
-
-
Chang, S.1
Shieh, S.2
Lin, W.3
Hsieh, C.4
-
2
-
-
27644460282
-
A Bootstrapping Scheme for Inter-Sensor authentication within Sensor Networks
-
October
-
Chen, W., Chen, Y.: A Bootstrapping Scheme for Inter-Sensor authentication within Sensor Networks. In: IEEE Communication Letters, vol. 9(10) (October 2005)
-
(2005)
IEEE Communication Letters
, vol.9
, Issue.10
-
-
Chen, W.1
Chen, Y.2
-
3
-
-
28444433009
-
Random key distribution schemes for sensor networks
-
May
-
Chen, H., Perrig, A., Song, D.: Random key distribution schemes for sensor networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197-215.(May 2003)
-
(2003)
Proc. IEEE Symposium on Security and Privacy
, pp. 197-215
-
-
Chen, H.1
Perrig, A.2
Song, D.3
-
4
-
-
35248846963
-
-
Deng, J., Han, R., Mishra, S.: A performance evaluation of instrusion-tolerant routing in wireless sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, 2634, pp. 349-364. Springer, Heidelberg (2003)
-
Deng, J., Han, R., Mishra, S.: A performance evaluation of instrusion-tolerant routing in wireless sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol. 2634, pp. 349-364. Springer, Heidelberg (2003)
-
-
-
-
6
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
8
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
February
-
Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. Annual Network and Distributed System Security Symposium(NDSS), pp. 263-276 (February 2003)
-
(2003)
Proc. Annual Network and Distributed System Security Symposium(NDSS)
, pp. 263-276
-
-
Liu, D.1
Ning, P.2
-
9
-
-
38149096214
-
Efficient Broadcast Authentication in WSNs
-
Moon, H., Lee, S.: Efficient Broadcast Authentication in WSNs. In: Proc. of IEEK vol. 43(6), pp. 683-689 (2006)
-
(2006)
Proc. of IEEK
, vol.43
, Issue.6
, pp. 683-689
-
-
Moon, H.1
Lee, S.2
-
10
-
-
4243082091
-
Security In Wirless Sensor Networks
-
Perrig, A., Stankovic, J., Wagner, D.: Security In Wirless Sensor Networks. Communication of the ACM 47, 53-57 (2004)
-
(2004)
Communication of the ACM
, vol.47
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
11
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8, 521-534 (2002)
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
12
-
-
33144476837
-
Location-Based Compromise-Tolerant Security Mechanism for Wirless Sensor Networks
-
February
-
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-Based Compromise-Tolerant Security Mechanism for Wirless Sensor Networks. In: IEEE Journal on Selected Areas in Communications, vol. 24(2), (February 2006)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
13
-
-
38149037164
-
LEAP: Efficient security mechanism for large-scale distributed sensor networks
-
April
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanism for large-scale distributed sensor networks. In: Proc. Symposium on Information Processing in Sensor Networks (IPSN), pp. 259-268 (April 2004)
-
(2004)
Proc. Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 259-268
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|