-
2
-
-
85028765277
-
Perfectly-Secure Key Distribution for Dynamic Conferencess
-
93, pp
-
C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferencess," Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '93), pp. 471-486, 1993.
-
(1993)
Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO
, pp. 471-486
-
-
Blundo, C.1
Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
3042783638
-
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks
-
W. Du, J. Deng, Y.S. Han, and P.K. Varshney, "A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 42-51, 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
5
-
-
8344262333
-
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge
-
W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
7
-
-
0001553129
-
Critical Power for Asymptotic Connectivity in Wireless Networks
-
P. Gupta and P.R. Kumar, "Critical Power for Asymptotic Connectivity in Wireless Networks," Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming, pp. 547-566, 1998.
-
(1998)
Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming
, pp. 547-566
-
-
Gupta, P.1
Kumar, P.R.2
-
8
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs," Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04) pp. 119-132, 2004.
-
(2004)
Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
11
-
-
84866860550
-
Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks
-
D. Liu and P. Ning, "Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks," ACM Trans. Sensor Networks (ToSN), vol. 1, no. 2, pp. 204-239, 2005.
-
(2005)
ACM Trans. Sensor Networks (ToSN)
, vol.1
, Issue.2
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
12
-
-
0031287494
-
The Longest Edge of the Random Minimum Spanning Tree
-
M.D. Penrose, "The Longest Edge of the Random Minimum Spanning Tree," The Annals of Applied Probability, vol. 7, no. 2, pp. 340-361, 1997.
-
(1997)
The Annals of Applied Probability
, vol.7
, Issue.2
, pp. 340-361
-
-
Penrose, M.D.1
-
13
-
-
0041939724
-
Unreliable Sensor Grids: Coverage, Connectivity and Diameter
-
S. Shakkottai, R. Srikant, and N. Shroff, "Unreliable Sensor Grids: Coverage, Connectivity and Diameter," Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Shakkottai, S.1
Srikant, R.2
Shroff, N.3
-
17
-
-
24944442139
-
A Robust Group-Based Key Management Scheme for Wireless Sensor Networks
-
Z. Yu and Y. Guan, "A Robust Group-Based Key Management Scheme for Wireless Sensor Networks," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), vol. 4, pp. 1915-1920, 2005.
-
(2005)
Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05)
, vol.4
, pp. 1915-1920
-
-
Yu, Z.1
Guan, Y.2
-
18
-
-
10044284351
-
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 62-72, 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
19
-
-
84943553152
-
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach," Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03), pp. 326-335, 2003.
-
(2003)
Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03)
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|