-
2
-
-
0034771605
-
SPINS: Security protocols for sensor netowrks
-
Online, Available
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "SPINS: security protocols for sensor netowrks," in Mobile Computing and Networking, 2001, pp. 189-199. [Online]. Available: citeseer.ist.psu.edu/perrig01spins.html
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
4
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
New York, NY. USA: Springer-Verlag Now York, Inc
-
M. Tatebayashi, N. Matsuzaki, and J. David B. Newman, "Key distribution protocol for digital mobile communication systems," in CRYPTO '89: Proceedings on Advances in cryptology. New York, NY. USA: Springer-Verlag Now York, Inc., 1989, pp. 324-334.
-
(1989)
CRYPTO '89: Proceedings on Advances in cryptology
, pp. 324-334
-
-
Tatebayashi, M.1
Matsuzaki, N.2
David, J.3
Newman, B.4
-
5
-
-
0035704362
-
Providing probust and ubiqutious security support for mobile ad-hoc networks
-
J. Kong, P. Zefros, H. Luo, and L. Zhang, "Providing probust and ubiqutious security support for mobile ad-hoc networks," in IEEE International Conference on Network Protocols, 2001.
-
(2001)
IEEE International Conference on Network Protocols
-
-
Kong, J.1
Zefros, P.2
Luo, H.3
Zhang, L.4
-
6
-
-
33747616480
-
Design of secure end-toEnd protocols for mobile systems
-
Online, Available
-
V. Varadharajan and Y. Mu. "Design of secure end-toEnd protocols for mobile systems," in IFIP World Conference on Mobile Communications, 1996, pp. 258-266. [Online]. Available: citeseer.ist.psu.edu/ varadharajan96design.html
-
(1996)
IFIP World Conference on Mobile Communications
, pp. 258-266
-
-
Varadharajan, V.1
Mu, Y.2
-
7
-
-
0025212474
-
A matrix key-distribution scheme
-
Online, Available
-
L. Gong and D. J. Wheeler, "A matrix key-distribution scheme," Journal of Cryptology: the journal of the International Association for Cryptologic Research, vol. 2, no. 1, pp. 51-59, 1990. [Online]. Available: citeseer.ist.psu.edu/gong90matrix.html
-
(1990)
Journal of Cryptology: The journal of the International Association for Cryptologic Research
, vol.2
, Issue.1
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
8
-
-
30344441104
-
-
S. S. Kulkarni, M. G. Gouda, and A. Arora, Secret instantiation in ad-hoc networks, in In Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS) 2005. A final version of this paper has been published in Computer Communications, 29, pp. 200-215, 2006.
-
S. S. Kulkarni, M. G. Gouda, and A. Arora, "Secret instantiation in ad-hoc networks," in In Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS) 2005. A final version of this paper has been published in Computer Communications, Vol. 29, pp. 200-215, 2006.
-
-
-
-
9
-
-
33750953281
-
A family of collusion resistant protocols for instantiating security
-
Washington, DC, USA: IEEE Computer Society
-
S. S. Kulkarni and B. Bezawada, "A family of collusion resistant protocols for instantiating security." in ICNP '05: Proceedings of the 13TH IEEE International Conference on Network Protocols (ICNP'05). Washington, DC, USA: IEEE Computer Society, 2005, pp. 279-288.
-
(2005)
ICNP '05: Proceedings of the 13TH IEEE International Conference on Network Protocols (ICNP'05)
, pp. 279-288
-
-
Kulkarni, S.S.1
Bezawada, B.2
|