-
1
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Springer-Verlag
-
D. Boneh and M. Franlin. Identity-Based Encryption from the Weil Pairing. In CRYPTO, pages 213-229, Springer-Verlag, 2001.
-
(2001)
CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franlin, M.2
-
2
-
-
25844444279
-
Key Management in Ditributed Sensor Networks
-
D. Carman, B. Matt, P. Kruus, D. Balenson, and D. Branstad. Key Management in Ditributed Sensor Networks. In DARPA Sensor IT Workshop, 2000.
-
(2000)
DARPA Sensor IT Workshop
-
-
Carman, D.1
Matt, B.2
Kruus, P.3
Balenson, D.4
Branstad, D.5
-
3
-
-
25844435733
-
PIKE: Peer Intermediaries for Key Establishment in Sensor Networks
-
Miami, FL, March
-
H. Chan and A. Perrig. PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In INFOCOM, Miami, FL, March 2005.
-
(2005)
INFOCOM
-
-
Chan, H.1
Perrig, A.2
-
4
-
-
24944474308
-
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks
-
W. Du and J. Deng. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Du, W.1
Deng, J.2
-
5
-
-
0000534667
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In In Advances in Crytography - Proceedings of CRYPTO, pages 211-222, 1985.
-
(1985)
In Advances in Crytography - Proceedings of CRYPTO
, pp. 211-222
-
-
ElGamal, T.1
-
6
-
-
0038341106
-
A Key-management Scheme for Distributed Sensor Networks
-
November
-
L. Eschenauer and V.D. Gligor. A Key-management Scheme for Distributed Sensor Networks. In ACM CCS, November 2002.
-
(2002)
ACM CCS
-
-
Eschenauer, L.1
Gligor, V.D.2
-
7
-
-
27244436587
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Cambridge, MA, Aug
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In CHES, Cambridge, MA, Aug. 2004.
-
(2004)
CHES
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
8
-
-
51849112552
-
-
An Liu and Peng Ning, 2005
-
An Liu and Peng Ning. http://discovery.csc.ncsu.edu/software/TinyECC/, 2005.
-
-
-
-
9
-
-
3042822764
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
Washington, DC, October
-
D. Liu and P. Ning. Establishing Pairwise Keys in Distributed Sensor Networks. In ACM CCS, Washington, DC, October 2003.
-
(2003)
ACM CCS
-
-
Liu, D.1
Ning, P.2
-
10
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
September
-
B. Clifford Neuman and Theodore Ts'o. Kerberos: An Authentication Service for Computer Networks. IEEE Communications, 32(9):33-38, September 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Clifford Neuman, B.1
Ts'o, T.2
-
11
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security Protocols for Sensor Networks. ACM/Kluwer Wireless Networks Journal (WINET), September 2002.
-
(2002)
ACM/Kluwer Wireless Networks Journal (WINET)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
12
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
51849103485
-
-
TinyOS. TinyOS 1.1.15. http://www.tinyos.net, 2006.
-
(2006)
TinyOS 1.1.15
-
-
-
15
-
-
51349093348
-
ECC: An Elliptic Curve Cryptography Suite on Sensor Motes
-
Technical Report WM-CS-2007-11, College of William and Mary, Computer Science, Williamsburg, VA
-
H. Wang, B. Sheng, C. C. Tan, and Q. Li. WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes. Technical Report WM-CS-2007-11, College of William and Mary, Computer Science, Williamsburg, VA, 2007.
-
(2007)
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
WM, Q.L.4
-
16
-
-
3543100577
-
Statistical En-Route Filtering of Injected False Data in Sensor Networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical En-Route Filtering of Injected False Data in Sensor Networks. In INFOCOM, 2004.
-
(2004)
INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
17
-
-
83455207833
-
MicroHash: An Efficient Index Structure for Flash-Based Sensor Devices
-
D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W. A. Najjar. MicroHash: An Efficient Index Structure for Flash-Based Sensor Devices. In FAST, 2005.
-
(2005)
FAST
-
-
Zeinalipour-Yazti, D.1
Lin, S.2
Kalogeraki, V.3
Gunopulos, D.4
Najjar, W.A.5
-
18
-
-
29844438193
-
Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks
-
Chicago, IL, May
-
W. Zhang, H. Song, S. Zhu, and G. Cao. Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks. In MOBIHOC, Chicago, IL, May 2005.
-
(2005)
MOBIHOC
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
19
-
-
33144476837
-
Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks
-
Feb
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang. Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications, 24(2):247-260, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|