-
3
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228-258, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
4
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
presented at the, Santa Clara, CA, Oct, Online, Available
-
D. Malan, M. Welsh, and M. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," presented at the 1st IEEE Int. Conf. Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, Oct. 2004. [Online]. Available: citeseer.ist.psu.edu/ malan04publickey.html.
-
(2004)
1st IEEE Int. Conf. Sensor and Ad Hoc Communications and Networks
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
5
-
-
0036738266
-
SPINS : Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS : Security protocols for sensor networks," Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Netw
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
7
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
New York
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. 10th ACM Conf. Computer and Communications Security, New York, 2003, pp. 62-72.
-
(2003)
Proc. 10th ACM Conf. Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
8
-
-
33745142955
-
Network coding: An instant primer
-
C. Fragouli, J.-Y. L. Boudec, and J. Widmer, "Network coding: An instant primer," Proc. SIGCOMM Comput. Commun. Rev., vol. 36, no. 1, pp. 63-68, 2006.
-
(2006)
Proc. SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.1
, pp. 63-68
-
-
Fragouli, C.1
Boudec, J.-Y.L.2
Widmer, J.3
-
9
-
-
49549114532
-
-
S. Deb, M. Effros, T. Ho, D. Karger, R. Koetter, D. Lun, M. Medard, and N. Ratnakar, Network coding for wireless applications: A brief tutorial, presented at the IWWAN, London, U.K., May 2005.
-
S. Deb, M. Effros, T. Ho, D. Karger, R. Koetter, D. Lun, M. Medard, and N. Ratnakar, "Network coding for wireless applications: A brief tutorial," presented at the IWWAN, London, U.K., May 2005.
-
-
-
-
10
-
-
69849097856
-
Weakly secure network coding
-
presented at the, Riva del Garda, Italy
-
K. Bhattad and K. Narayanan, "Weakly secure network coding," presented at the 1st Workshop on Network Coding, Theory, and Applications, Riva del Garda, Italy, 2005.
-
(2005)
1st Workshop on Network Coding, Theory, and Applications
-
-
Bhattad, K.1
Narayanan, K.2
-
11
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. J. Anderson, B. Christiansen, B. Crispo, J. A. Malcolm, and M. Roe, Eds, Security Pmtocols Workshop, Sci, Springer
-
F. Stajano and R. J. Anderson, B. Christiansen, B. Crispo, J. A. Malcolm, and M. Roe, Eds., "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Security Pmtocols Workshop, 1999, vol. 1796, pp. 172-194, Lecture Notes Comput. Sci., Springer.
-
(1999)
Lecture Notes Comput
, vol.1796
, pp. 172-194
-
-
-
12
-
-
0013413164
-
-
New York: Wiley, Feb. 2002, Online, Available
-
F. Stajano, Security for Ubiquitous Computing. New York: Wiley, Feb. 2002. [Online]. Available: http://www.cl.cam.ac.uk/fms27/secubicomp/.
-
Security for Ubiquitous Computing
-
-
Stajano, F.1
-
13
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," J. Amer. Inst. Elect. Eng., vol. XLV, pp. 109-115, 1926.
-
(1926)
J. Amer. Inst. Elect. Eng
, vol.45
, pp. 109-115
-
-
Vernam, G.S.1
-
15
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Netw., vol. 1, no. 2-3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Netw
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
16
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
presented at the, Information Theory, Chicago, IL, Jul
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," presented at the IEEE Int. Symp. Information Theory, Chicago, IL, Jul. 2004.
-
(2004)
IEEE Int. Symp
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.6
-
17
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Oct
-
D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," IEEE Trans. Very Large Scale Integr. Syst., vol. 13, no. 10, pp. 1200-1205, Oct. 2005.
-
(2005)
IEEE Trans. Very Large Scale Integr. Syst
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
18
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
20
-
-
33745855808
-
Tampering with motes: Real-world physical attacks on wireless sensor networks
-
A. Becher, Z. Benenson, and M. Dornseif, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds, Proc. 3rd Int. Conf. Security Pervasive Comput, York, U.K, Apr. 18-21, Springer, Sci
-
A. Becher, Z. Benenson, and M. Dornseif, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds., "Tampering with motes: Real-world physical attacks on wireless sensor networks," in Proc. 3rd Int. Conf. Security Pervasive Comput., York, U.K., Apr. 18-21, 2006, vol. 3934, pp. 104-118, Springer, 2006, ser. Lecture Notes Comput. Sci.
-
(2006)
ser. Lecture Notes Comput
, vol.3934
, pp. 104-118
-
-
-
21
-
-
51649118865
-
Random, linear network, coding: A free cipher?
-
presented at the, Information Theory, Jun
-
L. Lima, M. Medard, and J. Barros, "Random, linear network, coding: A free cipher?," presented at the IEEE Int. Symp. Information Theory, Jun. 2007.
-
(2007)
IEEE Int. Symp
-
-
Lima, L.1
Medard, M.2
Barros, J.3
|