-
1
-
-
0038341106
-
A Key Management Scheme [ for Distributed Sensor Networks
-
L. Eschenauer and V. D. Gligor, "A Key Management Scheme [ for Distributed Sensor Networks," ACM CCS, pp. 41-47, 2000.
-
(2000)
ACM CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
2
-
-
0345565893
-
A survey of key management for secure group communication
-
Sandro Rafaeli and David Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, pp. 309-329, 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
3
-
-
50249091871
-
Authenticated interleaved encryption
-
Cryptology ePrint Archive, Report 2006/416
-
Claude Castelluccia, "Authenticated interleaved encryption," Cryptology ePrint Archive, Report 2006/416, 2006, http://eprint.iacr.org/.
-
(2006)
-
-
Castelluccia, C.1
-
4
-
-
27544485427
-
Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts
-
May
-
M. Goodrich, "Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts," in IEEE Security and Privacy, May 2005.
-
(2005)
IEEE Security and Privacy
-
-
Goodrich, M.1
-
5
-
-
50249156626
-
Does encryption with redundancy provide authenticity?
-
Jee An and Mihir Bellare, "Does encryption with redundancy provide authenticity?," in EUROCRYPT, 2001.
-
(2001)
EUROCRYPT
-
-
Jee An1
Bellare, M.2
-
6
-
-
0010227492
-
The order of encryption and authentication for protecting communications
-
Hugo Krawczyk, "The order of encryption and authentication for protecting communications," in CRYPTO, 2001.
-
(2001)
CRYPTO
-
-
Krawczyk, H.1
-
8
-
-
50249113528
-
Effi cient aggregation of encryption data in wireless sensor networks
-
Claude Castelluccia, Einar Mykletun, and Gene Tsudik, "Effi cient aggregation of encryption data in wireless sensor networks," in IEEE Mobiquitous, 2005.
-
(2005)
IEEE Mobiquitous
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
11
-
-
3042783638
-
A pairwise pre-distribution scheme for wireless sensor networks
-
W. Du, J.Deng, Y Han, and P. Varshney, "A pairwise pre-distribution scheme for wireless sensor networks," in ACM Conf. Computer and Communication Security, 2003.
-
(2003)
ACM Conf. Computer and Communication Security
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
14
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
November
-
Yongdae Kim, Adrian Perring, and Gene Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in ACM CCS, November 2000, pp. 235-244.
-
(2000)
ACM CCS
, pp. 235-244
-
-
Kim, Y.1
Perring, A.2
Tsudik, G.3
-
15
-
-
33645388276
-
Integrity preservation for communication in sensor networks,
-
Tech. Rep. 434, ETH Zurich, Institute for Pervasive Computing, Feb
-
Harald Vogt, "Integrity preservation for communication in sensor networks," Tech. Rep. 434, ETH Zurich, Institute for Pervasive Computing, Feb. 2004.
-
(2004)
-
-
Vogt, H.1
-
16
-
-
3543056512
-
An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks
-
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," Security and Privacy, 2004.
-
(2004)
Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
17
-
-
50249188062
-
-
Suna Melek Önen and Refi k Molva, Secure data aggregation with multiple encryption, in EWSN 2007, European Wireless Sensor Networks, January 29-31, 2007, Delf, The Netherlands, 2007.
-
Suna Melek Önen and Refi k Molva, "Secure data aggregation with multiple encryption," in EWSN 2007, European Wireless Sensor Networks, January 29-31, 2007, Delf, The Netherlands, 2007.
-
-
-
|