-
1
-
-
0035789267
-
Secure pebblenets
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of ACM International Symposium on Mobile ad hoc networking and computing, pages 156-163, 2001.
-
(2001)
Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
2
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. De Santis, Amir Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology - CRYPTO '92, LNCS 740, pages 471-486, 1993.
-
(1993)
Advances in Cryptology - CRYPTO '92, LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
4544365398
-
Constrains and approaches for distributed sensor network security
-
NAI Labs
-
D.W. Carman, P.S. Kruus, and B.J.Matt. Constrains and approaches for distributed sensor network security. Technical report, NAI Labs, 2000.
-
(2000)
Technical Report
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
7
-
-
0022793132
-
How to construct random functions
-
October
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792-807, October 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
9
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
February
-
D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 263-276, February 2003.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
, pp. 263-276
-
-
Liu, D.1
Ning, P.2
-
11
-
-
84884315660
-
A real-time communication architecture for large-scale wireless sensor networks
-
San Jose, California, September
-
C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and T. He. Rap: A real-time communication architecture for large-scale wireless sensor networks. In The 8th IEEE Real-Time and Embedded Technology and Applications Symposium, San Jose, California, September 2002.
-
(2002)
The 8th IEEE Real-Time and Embedded Technology and Applications Symposium
-
-
Lu, C.1
Blum, B.2
Abdelzaher, T.3
Stankovic, J.4
Rap, T.He.5
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255-265, 2000.
-
(2000)
Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar. Spins: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001.
-
(2001)
Proceedings of Seventh Annual International Conference on Mobile Computing and Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
18
-
-
2642534140
-
Efficient and mutually authenticated key exchange for low power computing devices
-
Dec
-
D. Wong and A. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Proc. ASIACRYPT 2001., Dec 2001.
-
(2001)
Proc. ASIACRYPT 2001
-
-
Wong, D.1
Chan, A.2
-
19
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
|