-
1
-
-
0029718780
-
A class of flexible and efficient key management protocols
-
Washington, DC, USA: IEEE Computer Society
-
C. Boyd, "A class of flexible and efficient key management protocols," in CSFW '96: Proceedings of the Ninth IEEE Computer Security Foundations Workshop. Washington, DC, USA: IEEE Computer Society, 1996, p. 2.
-
(1996)
CSFW '96: Proceedings of the Ninth IEEE Computer Security Foundations Workshop
, pp. 2
-
-
Boyd, C.1
-
2
-
-
0027617271
-
Increasing availability and security of an authentication service
-
June
-
L. Gong, "Increasing availability and security of an authentication service," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 657-662, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
3
-
-
0029513859
-
Key distribution without individual trusted authentication servers
-
IEEE Computer Society Press, June
-
L. Chen, D. Gollmann, and C. J. Mitchell, "Key distribution without individual trusted authentication servers," in 8th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1995, pp. 30-36.
-
(1995)
8th IEEE Computer Security Foundations Workshop
, pp. 30-36
-
-
Chen, L.1
Gollmann, D.2
Mitchell, C.J.3
-
4
-
-
47749104834
-
Introduction to wireless sensor networks
-
N. Bulusu and S. Jha, Eds. Artech House
-
N. Bulusu, "Introduction to wireless sensor networks," in Wireless Sensor Networks: A Systems Perspective, N. Bulusu and S. Jha, Eds. Artech House, 2005.
-
(2005)
Wireless Sensor Networks: A Systems Perspective
-
-
Bulusu, N.1
-
5
-
-
47749133330
-
-
Crossbow, "Crossbow," http://www.xbow.com/, 2006.
-
(2006)
Crossbow
-
-
Crossbow1
-
6
-
-
47749097438
-
-
TinyOS, "http://www.tinyos.net/," 2006.
-
(2006)
-
-
-
7
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," in Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), Rome, Italy, July 2001.
-
(2001)
Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
8
-
-
20344381294
-
A public-key infrastructure for key distribution in tiny os based on elliptic curve cryptography
-
Santa Clara, CA, USA: IEEE Computer Society Press, October
-
D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in tiny os based on elliptic curve cryptography," in Proc. 1st IEEE Communications Society Conference on Sensor and Ah Hoc Communications and Networks (SECON '04). Santa Clara, CA, USA: IEEE Computer Society Press, October 2004, pp. 71-80.
-
(2004)
Proc. 1st IEEE Communications Society Conference on Sensor and Ah Hoc Communications and Networks (SECON '04)
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
9
-
-
47749111952
-
Protecting small keys in authentication protocols for wireless sensor networks
-
Melbourne, Australia, December, to be published
-
K. Singh, K. Bhatt, and V Muthukkumarasamy, "Protecting small keys in authentication protocols for wireless sensor networks," in Proceedings of the Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, December 2006, to be published.
-
(2006)
Proceedings of the Australian Telecommunication Networks and Applications Conference
-
-
Singh, K.1
Bhatt, K.2
Muthukkumarasamy, V.3
-
10
-
-
23944488346
-
Exploring message authentication in sensor networks
-
Heidelberg, Germany, August
-
H. Vogt, "Exploring message authentication in sensor networks." in ESAS, Heidelberg, Germany, August 2004, pp. 19-30.
-
(2004)
ESAS
, pp. 19-30
-
-
Vogt, H.1
-
11
-
-
18844457825
-
Sia: Secure information aggregation in sensor networks
-
New York, NY, USA: ACM Press
-
B. Przydatek, D. Song, and A. Perrig, "Sia: secure information aggregation in sensor networks," in SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems. New York, NY, USA: ACM Press, 2003, pp. 255-265.
-
(2003)
SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
12
-
-
14844300164
-
Resilient aggregation in sensor networks
-
New York, NY, USA: ACM Press
-
D. Wagner, "Resilient aggregation in sensor networks," in SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2004, pp. 78-87.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 78-87
-
-
Wagner, D.1
-
13
-
-
18844407590
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
New York, NY, USA: ACM Press
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems. New York, NY, USA: ACM Press, 2003, pp. 308-309.
-
(2003)
SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems
, pp. 308-309
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
14
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies in wireless sensor networks
-
IEEE, June
-
J. Deng, R. Han, and S. Mishra, "Intrusion tolerance and anti-traffic analysis strategies in wireless sensor networks," in Dependable Systems and Networks, 2004 International Conference on. IEEE, June 2004, pp. 637-646.
-
(2004)
Dependable Systems and Networks, 2004 International Conference on
, pp. 637-646
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
16
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
New York, NY, USA: ACM Press
-
M. Bellare and P. Rogaway, "Provably secure session key distribution: the three party case," in STOC '95: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing. New York, NY, USA: ACM Press, 1995, pp. 57-66.
-
(1995)
STOC '95: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
New York, NY, USA: ACM Press
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems. New York, NY, USA: ACM Press, 2004, pp. 162-175.
-
(2004)
SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
18
-
-
84945119254
-
Entity authentication and key distribution
-
New York, NY, USA: Springer-Verlag New York, Inc
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1994, pp. 232-249.
-
(1994)
CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
19
-
-
0029368205
-
Secure and minimal protocols for authenticated key distribution
-
September
-
P. Janson and G. Tsudik, "Secure and minimal protocols for authenticated key distribution," Computer Communications, vol. 18, no. 9, pp. 645-653, September 1995.
-
(1995)
Computer Communications
, vol.18
, Issue.9
, pp. 645-653
-
-
Janson, P.1
Tsudik, G.2
-
20
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|