-
1
-
-
51349159923
-
-
Specification for the Advanced Encryption Standard AES, Federal Information Processing Standards Publication 197, 2001. Available from
-
Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, 2001. Available from: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
-
-
-
-
3
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
Available from
-
Mihir Bellare and Phillip Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In 1st ACM Conference on Computer and Communications Security, pages 62-73, 1993. Available from: http://citeseer.ist.psu.edu/bellare95random.html.
-
(1993)
1st ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
85028765277
-
-
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and Moti Yung. Perfectly-Secure Key Distribution for Dynamic Conferences. Advances in Cryptology-CRYPTO '92, Springer-Verlag, Berlin, 740:471-486, 1993. Available from: http://citeseer.ist.psu.edu/blundo95perfectlysecure.html.
-
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and Moti Yung. Perfectly-Secure Key Distribution for Dynamic Conferences. Advances in Cryptology-CRYPTO '92, Springer-Verlag, Berlin, 740:471-486, 1993. Available from: http://citeseer.ist.psu.edu/blundo95perfectlysecure.html.
-
-
-
-
6
-
-
0038487088
-
Predistribution Schemes for Sensor Networks
-
Available from
-
Haowen Chan, Adrian Perrig, and Dawn Song. Random Key Predistribution Schemes for Sensor Networks. In Proceedings of the 2003 IEEE Symposium, on Security and Privacy, pages 197-215, 2003. Available from: http://citeseer.ist.psu.edu/chan03random.html.
-
(2003)
Proceedings of the 2003 IEEE Symposium, on Security and Privacy
, pp. 197-215
-
-
Chan, H.1
Perrig, A.2
Song, D.3
Key, R.4
-
9
-
-
51349160391
-
-
Carl Ellison. RFC 2692-SPKI Requirements. Technical report, Network Working Group, September 1999. Available from: ftp://ftp. isi.edu/in-notes/ rfc2692.txt.
-
Carl Ellison. RFC 2692-SPKI Requirements. Technical report, Network Working Group, September 1999. Available from: ftp://ftp. isi.edu/in-notes/ rfc2692.txt.
-
-
-
-
10
-
-
51349109024
-
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylonen. RFC 2693-SPKI Certificate Theory. Technical report, Network Working Group, September 1999. Available from: ftp://ftp.isi.edu/in-notes/rfc2693.txt.
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylonen. RFC 2693-SPKI Certificate Theory. Technical report, Network Working Group, September 1999. Available from: ftp://ftp.isi.edu/in-notes/rfc2693.txt.
-
-
-
-
11
-
-
51349090817
-
Management Scheme for Distributed Sensor Networks
-
Technical report, Electrical and Computer Engineering Department, University of Maryland, College Park, MD, USA, Available from
-
Laurent Eschenauer and Virgil Gligor. A Key Management Scheme for Distributed Sensor Networks. Technical report, Electrical and Computer Engineering Department, University of Maryland, College Park, MD, USA, 2004. Available from: http://www.cs.umbc.edu/courses/graduate/CMSC691A/Spring04/ papers/eschenauer02keymanagement.pdf.
-
(2004)
-
-
Eschenauer, L.1
Gligor, V.2
-
12
-
-
14844314204
-
Locationaware key management scheme for wireless sensor networks
-
New York, NY, USA, ACM Press
-
Dijiang Huang, Manish Mehta, Deep Medhi, and Lein Ham. Locationaware key management scheme for wireless sensor networks. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 29-42, New York, NY, USA, 2004. ACM Press.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Ham, L.4
-
14
-
-
51349167071
-
-
IBM Research. On the drawing board-Secure Trade Lane for worldwide goods exchange. Webpage, December 2006. Available from: http://domino.research.ibm. com/odis/odis.nsf/pages/board.06.html.
-
IBM Research. On the drawing board-Secure Trade Lane for worldwide goods exchange. Webpage, December 2006. Available from: http://domino.research.ibm. com/odis/odis.nsf/pages/board.06.html.
-
-
-
-
15
-
-
51349110335
-
-
International Maritime Organisation, Webpage, January, Available from
-
International Maritime Organisation. FAQ on ISPS code and maritime security. Webpage, January 2006. Available from: http://www.imo.org/Newsroom/ mainframe.asp?topic_id=897.
-
(2006)
FAQ on ISPS code and maritime security
-
-
-
16
-
-
51349092219
-
Key Management for Scalable and Energy Efficient Crypto On Sensors
-
SECOS:, TR-2003-33, 2003. Available from
-
Issa Khalil and Saurabh Bagchi. SECOS: Key Management for Scalable and Energy Efficient Crypto On Sensors. CERIAS Technical Report TR-2003-33, 2003. Available from: http://cobweb.ecn.purdue.edu/̃dcsl/Publications/papers/ secos_dsn04_submit.pdf.
-
CERIAS Technical Report
-
-
Khalil, I.1
Bagchi, S.2
-
17
-
-
51349129909
-
-
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (Informational), February 1997. Available from: http://www.ietf.org/rfc/rfc2104.txt.
-
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (Informational), February 1997. Available from: http://www.ietf.org/rfc/rfc2104.txt.
-
-
-
-
18
-
-
51349110779
-
Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks
-
A, Available from
-
Yee Wei Law, Ricardo Corin, Sandro Etalle, and Pieter Hartel. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In Personal Wireless Communications, 2003. Available from: citeseer.ist.psu.edu/law03formally.html.
-
(2003)
Personal Wireless Communications
-
-
Yee, W.1
Corin, R.2
Etalle, S.3
Hartel, P.4
-
19
-
-
33745269795
-
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks
-
2:24, Available from
-
Yee Wei Law, Jeroen Doumen, and Pieter Hartel. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 2:24, 2006. Available from: http://www.ub. utwente.nl/webdocs/ctit/1/000000eb.pdf.
-
(2006)
ACM Transactions on Sensor Networks (TOSN)
-
-
Yee, W.1
Doumen, J.2
Hartel, P.3
-
20
-
-
3042822764
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
Available from
-
Donggang Liu and Peng Ning. Establishing Pairwise Keys in Distributed Sensor Networks. In ACM Transactions on Information and System Security (TISSEC), volume 8, pages 52-61, 2003. Available from: citeseer.ist.psu.edu/ liu03establishing.html.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
21
-
-
84944878354
-
-
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography, Fifth Printing (August 2001). CRC Press, October 1996. Available from: http://www.cacr. math.uwaterloo.ca/hac/ index.html.
-
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography, volume Fifth Printing (August 2001). CRC Press, October 1996. Available from: http://www.cacr. math.uwaterloo.ca/hac/ index.html.
-
-
-
-
22
-
-
0003618441
-
-
Technical report, Computer Security Division, National Institute of Standards and Technology, U.S. Department of Commerce, October, Available from
-
J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback. Report on the Development of the Advanced Encryption Standard (AES). Technical report, Computer Security Division, National Institute of Standards and Technology, U.S. Department of Commerce, October 2000. Available from: http://csrc.nist.gov/CryptoToolkit/aes/round2/r2report.pdf.
-
(2000)
Report on the Development of the Advanced Encryption Standard (AES)
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Roback, E.7
-
23
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
September, Available from
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, September 2002. Available from: http://sparrow. ece.cmu.edu/%7Eadrian/projects/mc2001/spins-wine-journal.pdf.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
24
-
-
51349168427
-
NESSIE security report
-
2.0 edition, February 2003. Available from
-
B. Preneel, A. Biryukov, E. Oswald, B. Van Rompay, L. Granboulan, E. Dottax, S. Murphy, A. Dent, J. White, M. Dichtl, S. Pyka, M. Schafheutle, P. Serf, E. Biham, E. Barkan, O. Dunkelman, J.-J. Quisquater, M. Ciet, F. Sica, L. Knudsen, M. Parker, and H. Raddum. NESSIE security report. European Communities through the IST program under contract IST-1999-12324, 2.0 edition, February 2003. Available from: https://www.cosic.esat.kuleuven.be/nessie/ deliverables/D20-v2.pdf.
-
European Communities through the IST program under contract IST-1999-12324
-
-
Preneel, B.1
Biryukov, A.2
Oswald, E.3
Van Rompay, B.4
Granboulan, L.5
Dottax, E.6
Murphy, S.7
Dent, A.8
White, J.9
Dichtl, M.10
Pyka, S.11
Schafheutle, M.12
Serf, P.13
Biham, E.14
Barkan, E.15
Dunkelman, O.16
Quisquater, J.-J.17
Ciet, M.18
Sica, F.19
Knudsen, L.20
Parker, M.21
Raddum, H.22
more..
-
26
-
-
0004102023
-
-
Block Cipher. Online, August, Available from
-
Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. TheRC6 Block Cipher. Online, August 1998. Available from: http://theory.lcs. mit.edu/̃rivest/rc6.pdf.
-
(1998)
TheRC6
-
-
Rivest, R.L.1
Robshaw, M.J.B.2
Sidney, R.3
Yin, Y.L.4
-
27
-
-
51349089414
-
-
RSA Data Security, Inc. PKCS #5: Password-Based Encryption Standard, June 1991. Available from: ftp://ftp.rsasecurity.com/pub/pkcs/ps/ pkcs-5.ps.
-
RSA Data Security, Inc. PKCS #5: Password-Based Encryption Standard, June 1991. Available from: ftp://ftp.rsasecurity.com/pub/pkcs/ps/ pkcs-5.ps.
-
-
-
-
28
-
-
51349138170
-
-
Harald Sauff. Energieaufnahme von Kryptographiealgorithmen auf Sensorknoten. Diplomarbeit, Hamburg University of Technology, September 2006. Master thesis, German. Available from: http://www.sauff.org/download/uni/ diplomarbeit/da_hs06_energieaufnahme.pdf.
-
Harald Sauff. Energieaufnahme von Kryptographiealgorithmen auf Sensorknoten. Diplomarbeit, Hamburg University of Technology, September 2006. Master thesis, German. Available from: http://www.sauff.org/download/uni/ diplomarbeit/da_hs06_energieaufnahme.pdf.
-
-
-
-
30
-
-
51349115832
-
-
U.S. Customs and Border Protection. CSI In Brief. Webpage, January 2006. Available from: http://www.cbp.gov/xp/cgov/border_security/ international_activities/csi/csi_in_brief.xml.
-
U.S. Customs and Border Protection. CSI In Brief. Webpage, January 2006. Available from: http://www.cbp.gov/xp/cgov/border_security/ international_activities/csi/csi_in_brief.xml.
-
-
-
-
31
-
-
51349135292
-
-
U.S. Departement of Homeland Security-U.S. Coast Guard. Best Practice:100% X-Ray Container Screening. USCG Port Security Assessment-Best Practices Bulletin, January 2005. PFSO: Capt. Ben Hassan. Available from: http://www.uscg.mil/hq/g-m/mp/pdf/Best%20Practice%20-% 20Tunisia%20hundred%20percent%20x-ray%20screening.pdf.
-
U.S. Departement of Homeland Security-U.S. Coast Guard. Best Practice:100% X-Ray Container Screening. USCG Port Security Assessment-Best Practices Bulletin, January 2005. PFSO: Capt. Ben Hassan. Available from: http://www.uscg.mil/hq/g-m/mp/pdf/Best%20Practice%20-% 20Tunisia%20hundred%20percent%20x-ray%20screening.pdf.
-
-
-
-
32
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
New York, NY, USA, ACM Press
-
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 62-72, New York, NY, USA, 2003. ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|