-
1
-
-
42549125674
-
-
C. Blundo, A. santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology-CRYPTO, 1993.
-
(1993)
Advances in Cryptology-CRYPTO, Perfectly-secure key distribution for dynamic conferences
-
-
Blundo, C.1
santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
2
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In INFOCOM, 2005.
-
(2005)
INFOCOM
-
-
Chan, H.1
Perrig, A.2
-
4
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W Du, J. Deng, Y. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004.
-
(2004)
INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
5
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. Han, and P. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
6
-
-
29844457287
-
-
W Du, R. Wang, and P. Ning. an efficient scheme for authenticating public keys in sensor networks. In MobiHoc, 2005.
-
W Du, R. Wang, and P. Ning. an efficient scheme for authenticating public keys in sensor networks. In MobiHoc, 2005.
-
-
-
-
7
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenaer and V.D.Gligor. A key-management scheme for distributed sensor networks. In ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Eschenaer, L.1
Gligor, V.D.2
-
8
-
-
85055795738
-
Variations on the Themes of Message Freshness and Replay, or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols
-
L. Gong. Variations on the Themes of Message Freshness and Replay, or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. In Proceedings of the Computer Security Foundations Workshop VI, 1993.
-
(1993)
Proceedings of the Computer Security Foundations Workshop
, vol.6
-
-
Gong, L.1
-
9
-
-
4544231245
-
Intelligent fluid infrastructure for embedded networks
-
A. Kansal, A. A. Somasundara, D. D. Jea, M. B. Srivastava, and D. Estrin. Intelligent fluid infrastructure for embedded networks. In ACM MobiSys, pages 111-124, 2004.
-
(2004)
ACM MobiSys
, pp. 111-124
-
-
Kansal, A.1
Somasundara, A.A.2
Jea, D.D.3
Srivastava, M.B.4
Estrin, D.5
-
10
-
-
24944508408
-
Distillation codes and applications to DOS resistant multicast authentication
-
C. Karlof, N. sastry, Y. Li, A. Perrig, and J. Tygar. Distillation codes and applications to DOS resistant multicast authentication. In NDSS, 2004.
-
(2004)
NDSS
-
-
Karlof, C.1
sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.5
-
11
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
L. Lamport. Password authentication with insecure communication. Communication of the ACM, 24(11), November 1981.
-
(1981)
Communication of the ACM
, vol.24
, Issue.11
-
-
Lamport, L.1
-
12
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In NDSS, 2003.
-
(2003)
NDSS
-
-
Liu, D.1
Ning, P.2
-
13
-
-
3042822764
-
Establishing pairewise keys in distributed sensor networks
-
D. Liu and P. Ning. Establishing pairewise keys in distributed sensor networks. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Liu, D.1
Ning, P.2
-
14
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia. Practical broadcast authentication in sensor networks. In Mobiquitous, 2005.
-
(2005)
Mobiquitous
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
15
-
-
39049105693
-
-
UC Berkey The EECS department
-
UC Berkey The EECS department. Cotbots: The mobile mote-based robots, http://www-bsac.eecs.berkeley.edu/projects/cotbots/.
-
Cotbots: The mobile mote-based robots
-
-
-
17
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar. Spins: security protocols for sensor networks. In ACM MobiCom, 2001.
-
(2001)
ACM MobiCom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
18
-
-
4544244334
-
SIA: Secure information aggregation in sensor networks
-
B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In ACM SenSys, 2003.
-
(2003)
ACM SenSys
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
20
-
-
42549135649
-
-
I. C. Technology. Mica2: Wireless measurement system, http://www.xbow.com/product.pdf-files/wireless.pdf/6020-0042-0%4.a.mi ca2.pdf.
-
I. C. Technology. Mica2: Wireless measurement system, http://www.xbow.com/product.pdf-files/wireless.pdf/6020-0042-0%4.a.mi ca2.pdf.
-
-
-
-
21
-
-
17444417505
-
Efficient collection of sensor data in remote fields using mobile collectors
-
Y. Tirta, Z. Li, Y. Lu, and S. Bagchi. Efficient collection of sensor data in remote fields using mobile collectors. In ICCCN, 2004.
-
(2004)
ICCCN
-
-
Tirta, Y.1
Li, Z.2
Lu, Y.3
Bagchi, S.4
-
22
-
-
0034772133
-
Geography informed energy conservation for Ad Hoc routing
-
Y. Xu, J. Heidemann, and D. Estrin. Geography informed energy conservation for Ad Hoc routing. In ACM MobiCom, 2001.
-
(2001)
ACM MobiCom
-
-
Xu, Y.1
Heidemann, J.2
Estrin, D.3
-
23
-
-
0036949025
-
A two-tier data dissemination model for large-scale wireless sensor networks
-
F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang. A two-tier data dissemination model for large-scale wireless sensor networks. In ACM MobiCom, 2002.
-
(2002)
ACM MobiCom
-
-
Ye, F.1
Luo, H.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
24
-
-
20344387783
-
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
-
W. Zhang, G. Cao, and T. L. Porta. Data Dissemination with Ring-Based Index for Wireless Sensor Networks. In IEEE ICNP, 2003.
-
(2003)
IEEE ICNP
-
-
Zhang, W.1
Cao, G.2
Porta, T.L.3
-
25
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
W. Zhang, H. Song, S. Zhu, and G. Cao. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In MobiHoc, pages 378-389, 2005.
-
(2005)
MobiHoc
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
26
-
-
39049087772
-
Supporting Secure Communication and Data Collection in Mobile Sensor Networ
-
L. Zhou, J. Ni, and C. Ravishankar. Supporting Secure Communication and Data Collection in Mobile Sensor Networ. In INFOCOM, 2006.
-
(2006)
INFOCOM
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.3
|