-
2
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA, Nov
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. 9th ACM Conference on Computer and Communications Security (CCS'02), Washington, DC, USA, Nov. 2002, pp. 41-47.
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security (CCS'02)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
3
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, USA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. 2003 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003, pp. 197-213.
-
(2003)
Proc. 2003 IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
May
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
-
(2005)
ACM Trans. Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
5
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
Feb
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, Feb. 2005.
-
(2005)
ACM Trans. Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
6
-
-
35349015881
-
A canonical seed assignment model for key predistribution in wireless sensor networks
-
Oct
-
P. Tague and R. Poovendran, "A canonical seed assignment model for key predistribution in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 3, no. 4, Oct. 2007.
-
(2007)
ACM Transactions on Sensor Networks
, vol.3
, Issue.4
-
-
Tague, P.1
Poovendran, R.2
-
7
-
-
34248339107
-
Modeling adaptive node capture attacks in multi-hop wireless networks
-
Aug
-
_, "Modeling adaptive node capture attacks in multi-hop wireless networks," Ad Hoc Networks, vol. 5, no. 6, pp. 801-814, Aug. 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.6
, pp. 801-814
-
-
Tague, P.1
Poovendran, R.2
-
8
-
-
0036353798
-
Secure network coding
-
Lausanne, Switzerland, Jun./Jul
-
N. Cai and R. W. Yeung, "Secure network coding," in Proc. 2002 IEEE International Symposium on Information Theory (ISIT'02), Lausanne, Switzerland, Jun./Jul. 2002, p. 323.
-
(2002)
Proc. 2002 IEEE International Symposium on Information Theory (ISIT'02)
, pp. 323
-
-
Cai, N.1
Yeung, R.W.2
-
9
-
-
1842815876
-
Security based on network topology against the wiretapping attack
-
Feb
-
K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Communication, vol. 11, no. 1, pp. 68-71, Feb. 2004.
-
(2004)
IEEE Wireless Communication
, vol.11
, Issue.1
, pp. 68-71
-
-
Jain, K.1
-
11
-
-
13944283393
-
A survey on routing protocols for wireless sensor networks
-
May
-
K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, May 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.3
, pp. 325-349
-
-
Akkaya, K.1
Younis, M.2
-
12
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
Yokohama, Japan, Jun./Jul
-
T. Ho, R. Koetter, M. Medard, D. R. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in Proc. IEEE International Symposium on Information Theory (ISIT'03), Yokohama, Japan, Jun./Jul. 2003, p. 441.
-
(2003)
Proc. IEEE International Symposium on Information Theory (ISIT'03)
, pp. 441
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Karger, D.R.4
Effros, M.5
-
15
-
-
36149066759
-
On methods for the construction of networks dual to nonplanar networks
-
Nov
-
A. Bloch, "On methods for the construction of networks dual to nonplanar networks," Proceedings of the Physical Society, vol. 58, no. 6, pp. 677-694, Nov. 1946.
-
(1946)
Proceedings of the Physical Society
, vol.58
, Issue.6
, pp. 677-694
-
-
Bloch, A.1
-
16
-
-
0000951232
-
Worst-case analysis of greedy heuristics for integer programming with nonnegative data
-
Nov
-
G. Dobson, "Worst-case analysis of greedy heuristics for integer programming with nonnegative data," Mathematics of Operations Research, vol. 7, no. 4, pp. 515-531, Nov. 1982.
-
(1982)
Mathematics of Operations Research
, vol.7
, Issue.4
, pp. 515-531
-
-
Dobson, G.1
-
17
-
-
0000301097
-
Greedy heuristic for the set-covering problem
-
Aug
-
V. Chvatel, "Greedy heuristic for the set-covering problem," Mathematics of Operations Research, vol. 4, no. 3, pp. 233-235, Aug. 1979.
-
(1979)
Mathematics of Operations Research
, vol.4
, Issue.3
, pp. 233-235
-
-
Chvatel, V.1
|