-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
I. F. Akyildiz. W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 293-422, March 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 293-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
3543065166
-
Distributed Control Applications Within Sensor Networks
-
August
-
B. Sinopoli, C. Sharp, L. S. S. Schaffert, and S. S. Sastry, "Distributed Control Applications Within Sensor Networks," Proceedings of the IEEE, vol. 91, no. 8, pp. 1235-1246, August 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1235-1246
-
-
Sinopoli, B.1
Sharp, C.2
Schaffert, L.S.S.3
Sastry, S.S.4
-
3
-
-
0003978251
-
-
IETF, RFC 2627
-
D. M. Wallner, E. G. Harder, and R. C. Agee, "Key management for multicast: issues and architecture," IETF, RFC 2627, 1999.
-
(1999)
Key management for multicast: Issues and architecture
-
-
Wallner, D.M.1
Harder, E.G.2
Agee, R.C.3
-
4
-
-
27644488112
-
on the distribution and revocation of cryptographic keys in sensor networks
-
July-September
-
H. Chan, V. Gligor, A. Perrig, and G. Muralidharan, ""on the distribution and revocation of cryptographic keys in sensor networks", " IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, pp. 233-247, July-September 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.2
Perrig, A.3
Muralidharan, G.4
-
5
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington D.C, USA, October 27-30
-
L. Eschenauer and V D. Gligor, "A key-management scheme for distributed sensor networks," in 10th ACM Conference on Computer and Communication Security (CCS'03), Washington D.C., USA, October 27-30 2003, pp. 41-57.
-
(2003)
10th ACM Conference on Computer and Communication Security (CCS'03)
, pp. 41-57
-
-
Eschenauer, L.1
Gligor, V.D.2
-
6
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
11-14 May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy (SP'03), 11-14 May 2003, pp. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy (SP'03)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
0034771605
-
SPINS: Security suite for sensor networks
-
New York: ACM Press, July 16-21
-
A. Perrig, R. Szewczyk. V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security suite for sensor networks," in Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MOBICOM-01). New York: ACM Press, July 16-21 2001, pp. 189-199.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MOBICOM-01)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
8
-
-
0345565893
-
A Survey of Key Management for Secure Group Communication
-
September
-
S. Rafaeli and D. Hutchison, "A Survey of Key Management for Secure Group Communication," /ICM Computing Surveys, vol. 35, no. 3, pp. 309-329, September 2003.
-
(2003)
ICM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
9
-
-
0033893174
-
Secure Group Communications using Key Graphs
-
February
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure Group Communications using Key Graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, February 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
10
-
-
0000636954
-
The VersaKey Framework: Versatile Group Key Management
-
August
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The VersaKey Framework: Versatile Group Key Management," IEEE Journal on Selected Areas of Communications (Special Issue on Middleware), vol. 17, no. 9, pp. 1614-1631, August 1999.
-
(1999)
IEEE Journal on Selected Areas of Communications (Special Issue on Middleware)
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
11
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
12
-
-
33845938314
-
An efficient key revocation protocol for wireless sensor networks
-
Niagara-Falls, Buffalo-NY, 26-29 June
-
G. Dini and I. M. Savino, "An efficient key revocation protocol for wireless sensor networks," in Proceedings of IEEE WOW-MOM'06, Niagara-Falls, Buffalo-NY, 26-29 June 2006.
-
(2006)
Proceedings of IEEE WOW-MOM'06
-
-
Dini, G.1
Savino, I.M.2
-
13
-
-
84944878354
-
-
Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography. CRC Press, October 1996.
-
Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography. CRC Press, October 1996.
-
-
-
-
14
-
-
84886007598
-
-
Moteiv, "Tmote sky," http://www.moteiv.com/.
-
Tmote sky
-
-
-
15
-
-
0034445661
-
System Architecture Directions for Networked Sensors
-
Cambridge, Massachusetts, United States, November
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. S. J. Pister, "System Architecture Directions for Networked Sensors," in Proceedings of the Ninth Symposium on Architectural Support to Programming Languages and Operating Systems (ASPLOS), Cambridge, Massachusetts, United States, November 2000, pp. 93-104.
-
(2000)
Proceedings of the Ninth Symposium on Architectural Support to Programming Languages and Operating Systems (ASPLOS)
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
16
-
-
0347124644
-
-
161 National Institute of Standards and Technology NIST
-
[161 National Institute of Standards and Technology (NIST), "SKIPJACK and KEA algorithm specifications," 1998.
-
(1998)
SKIPJACK and KEA algorithm specifications
-
-
-
17
-
-
84948990100
-
The RC5 encryption algorithm
-
B. Preenel, Ed, Leuven, Belgium: Springer-Verlag, December 14-16
-
R. L. Rivest, "The RC5 encryption algorithm," in Proceedings of the Second International Workshop on fast Software Encryption, B. Preenel, Ed., vol. LNCS 1008. Leuven, Belgium: Springer-Verlag, December 14-16 1994, pp. 86-96.
-
(1994)
Proceedings of the Second International Workshop on fast Software Encryption
, vol.LNCS 1008
, pp. 86-96
-
-
Rivest, R.L.1
-
18
-
-
0009504774
-
-
Gaithersburg, MD, USA: National Institute for Standards and Technology, Apr. 1995, Online, Available
-
National Institute of Standards and Technology, FIPS PUB 180-1: Secure Hash Standard. Gaithersburg, MD, USA: National Institute for Standards and Technology, Apr. 1995. [Online]. Available: http://www.itl.nist.gov/fipspubs/ fip180-1.htm
-
FIPS PUB 180-1: Secure Hash Standard
-
-
-
19
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, United States, November 3-5
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A link layer security architecture for wireless sensor networks," in Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys'04), Baltimore, MD, United States, November 3-5 2004, pp. 162-175.
-
(2004)
Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys'04)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
|