-
1
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, California
-
Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California (2004)
-
(2004)
First IEEE International Conference on Sensor and Ad Hoc Communications and Networks
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
2
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521-534 (2002)
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
4
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
ACM Press, New York
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS 2003. Proceedings of the 10th ACM conference on Computer and communications security, pp. 62-72. ACM Press, New York (2003)
-
(2003)
CCS 2003. Proceedings of the 10th ACM conference on Computer and communications security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
6
-
-
33745142955
-
Network coding: An instant primer
-
Fragouli, C., Boudec, J.Y.L., Widmer, J.: Network coding: an instant primer. SIGCOMM Comput. Commun. Rev. 36(1), 63-68 (2006)
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.1
, pp. 63-68
-
-
Fragouli, C.1
Boudec, J.Y.L.2
Widmer, J.3
-
7
-
-
33845948794
-
Network coding for wireless applications: A brief tutorial
-
London, UK
-
Deb, S., Effros, M., Ho, T., Karger, D., Koetter, R., Lun, D., Medard, M., Ratnakar, N.: Network coding for wireless applications: A brief tutorial. In: Proc. of IWWAN, London, UK (2005)
-
(2005)
Proc. of IWWAN
-
-
Deb, S.1
Effros, M.2
Ho, T.3
Karger, D.4
Koetter, R.5
Lun, D.6
Medard, M.7
Ratnakar, N.8
-
8
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols, Springer, Heidelberg
-
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, pp. 172-194. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
10
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2), 228-258 (2005)
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
11
-
-
49649122357
-
-
Francillon, A., Castelluccia, C.: TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes. In: WiOpt. 5th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (2007)
-
Francillon, A., Castelluccia, C.: TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes. In: WiOpt. 5th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (2007)
-
-
-
-
12
-
-
31144476821
-
Extracting Secret Keys From Integrated Circuits
-
Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting Secret Keys From Integrated Circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13(10), 1200-1205 (2005)
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
14
-
-
33745855808
-
-
Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, 3934, pp. 104-118. Springer, Heidelberg (2006)
-
Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104-118. Springer, Heidelberg (2006)
-
-
-
|