-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) 'Wireless sensor networks: a survey', Computer Networks, Vol. 38, No. 4, pp. 393-422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
Bellare, M., Canetti, R. and Krawczyk, H. (1996b) 'Keying hash functions for message authentication', Advances in Cryptology-CRYPTO'96, Lectures Notes in Computer Science, Vol. 1109, pp. 1-15.
-
(1996)
Advances in Cryptology-CRYPTO'96, Lectures Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
Bellare, M., Guérin, R. and Rogaway, P. (1995) 'XOR MACs: new methods for message authentication using finite pseudorandom functions', Advances in Cryptology-CRYPTO'95, Lectures Notes in Computer Science, Vol. 963, pp. 15-28.
-
(1995)
Advances in Cryptology-CRYPTO'95, Lectures Notes in Computer Science
, vol.963
, pp. 15-28
-
-
Bellare, M.1
Guérin, R.2
Rogaway, P.3
-
6
-
-
84983089516
-
The security of cipher block chaining
-
Bellare, M., Kilian, J. and Rogaway, P. (1994) 'The security of cipher block chaining', Advances in Cryptology-CRYPTO'94, Lectures Notes in Computer Science, Vol. 839, pp. 340-358.
-
(1994)
Advances in Cryptology-CRYPTO'94, Lectures Notes in Computer Science
, vol.839
, pp. 340-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
7
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M., Kilian, J. and Rogaway, P. (2000) 'The security of the cipher block chaining message authentication code', Journal of Computer and System Sciences, Vol. 61, No. 3, pp. 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
8
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Santa Barbara, USA
-
Black, J., Halevi, S., Krawczyk, H., Krovetz, T. and Rogaway, P. (1999) 'UMAC: fast and secure message authentication', 19th Annual International Cryptology Conference (CRYPTO'99), Santa Barbara, USA, Vol. 1666, pp. 216-245.
-
(1999)
19th Annual International Cryptology Conference (CRYPTO'99)
, vol.1666
, pp. 216-245
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
9
-
-
84875634542
-
SKIPJACK review
-
28, July
-
Brickell, E. F., Denning, D. E., Kent, S. T., Mahler, D. P. and Tuchman, W. (1993) 'SKIPJACK review', Interim Report, 28, July, p. 8.
-
(1993)
Interim Report
, pp. 8
-
-
Brickell, E.F.1
Denning, D.E.2
Kent, S.T.3
Mahler, D.P.4
Tuchman, W.5
-
10
-
-
0012797660
-
WCA: A weight based clustering algorithm for mobile ad hoc networks
-
Chatterjee, M., Das, S. and Turgut, D. (2002) 'WCA: a weight based clustering algorithm for mobile ad hoc networks', Journal of ClusterComputing (Special Issueon MobileAd hoc Networks), Vol. 5, pp. 193-204.
-
(2002)
Journal of ClusterComputing (Special Issueon MobileAd Hoc Networks)
, vol.5
, pp. 193-204
-
-
Chatterjee, M.1
Das, S.2
Turgut, D.3
-
11
-
-
24944458273
-
Share the secret: Enabling location privacy in ubiquitous environments
-
Delakouridis, C., Kazatzopoulos, L., Marias, G. F. and Georgiadis, P. (2005) 'Share the secret: enabling location privacy in ubiquitous environments', Lecture Notes in Computer Science, Vol. 3479, pp. 289-305.
-
(2005)
Lecture Notes in Computer Science
, vol.3479
, pp. 289-305
-
-
Delakouridis, C.1
Kazatzopoulos, L.2
Marias, G.F.3
Georgiadis, P.4
-
12
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J. and Khalili, A. (2005) 'A pairwise key predistribution scheme for wireless sensor networks', ACM Transactions on Information Systems Security, Vol. 8, No. 2, pp. 228-258.
-
(2005)
ACM Transactions on Information Systems Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
13
-
-
0001820140
-
Cryptography and computer privacy
-
Fiestel, H. (1973) 'Cryptography and computer privacy', Scientific American, Vol. 228, No. 5, pp. 15-23.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Fiestel, H.1
-
14
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S. and Micali, S. (1986) 'How to construct random functions', Journal of the ACM, Vol. 33, No. 4, pp. 792-807.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
15
-
-
0034445661
-
System architecture directions for networked sensors
-
November
-
Hill, J., Szewczyk, A., Woo, A., Hollar, S. Culler, D., Pister, K. (2000) 'System architecture directions for networked sensors', Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), November, pp. 93-104.
-
(2000)
Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
, pp. 93-104
-
-
Hill, J.1
Szewczyk, A.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
17
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Karlof, C. and Wagner, D. (2003) 'Secure routing in wireless sensor networks: attacks and countermeasures', Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, Vol. 1, Nos. 2-3, pp. 293-315.
-
(2003)
Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
18
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD
-
Karlof, C., Sastry, N. and Wagner, D. (2004) 'TinySec: a link layer security architecture for wireless sensor networks', Second International Conference on Embedded Networked Sensor Systems, SenSys'04, Baltimore, MD, pp. 162-175.
-
(2004)
Second International Conference on Embedded Networked Sensor Systems, SenSys'04
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
21
-
-
84944878354
-
-
A CRC Press Company, Boca Raton, FL
-
Menezes, A., Oorschot Van, P. and Vanstone, S. (1996) 'Handbook of applied cryptography', A CRC Press Company, Boca Raton, FL.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot Van, P.2
Vanstone, S.3
-
22
-
-
33646918131
-
Telos: Enabling ultra-low power wireless research
-
Polastre, J., Szewczyk, R. and Culler, D. (2005) 'Telos: enabling ultra-low power wireless research', Proceedings of the Fourth International Conference on Information Processing in Sensor Networks: Special track on Platform Tools and Design Methods for Network Embedded Sensors, IPSN/SPOTS'05, pp. 364-369.
-
(2005)
Proceedings of the Fourth International Conference on Information Processing in Sensor Networks: Special Track on Platform Tools and Design Methods for Network Embedded Sensors, IPSN/SPOTS'05
, pp. 364-369
-
-
Polastre, J.1
Szewczyk, R.2
Culler, D.3
-
23
-
-
2442445104
-
A cluster based secure routing scheme for wireless ad hoc networks
-
IPCCC
-
Poosarla, R., Deng, H., Ojha, A. and Agarwal, D. P. (2004) 'A cluster based secure routing scheme for wireless ad hoc networks', IEEE, IPCCC, pp. 171-175.
-
(2004)
IEEE
, pp. 171-175
-
-
Poosarla, R.1
Deng, H.2
Ojha, A.3
Agarwal, D.P.4
-
24
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
Preneel, B. and Oorschot Van, P. (1995) 'MDx-MAC and building fast MACs from hash functions', Advances in Cryptology-CRYPTO'95, Lectures Notes in Computer Science, Vol. 963, pp. 1-14.
-
(1995)
Advances in Cryptology-CRYPTO'95, Lectures Notes in Computer Science
, vol.963
, pp. 1-14
-
-
Preneel, B.1
Oorschot Van, P.2
-
26
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M. and Carter, L. (1981) 'New hash functions and their use in authentication and set equality', Journal of Computing System Science, Vol. 22, pp. 265-279.
-
(1981)
Journal of Computing System Science
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
-
27
-
-
22944492132
-
AO2P: Ad hoc on-demand position-based private routing protocol
-
Wu, X. and Bhargava, B. K. (2005) 'AO2P: ad hoc on-demand position-based private routing protocol', IEEE Transactions on Mobile Computation, Vol. 4, pp. 335-348.
-
(2005)
IEEE Transactions on Mobile Computation
, vol.4
, pp. 335-348
-
-
Wu, X.1
Bhargava, B.K.2
-
29
-
-
0037630649
-
PEAS: A robust energy conserving protocol for long-lived sensor networks
-
Ye, F., Zhong, G., Lu, S. and Zhang, L. (2003) 'PEAS: a robust energy conserving protocol for long-lived sensor networks', International Conference on Distributed Computing Systems (ICDCS), pp. 28-29.
-
(2003)
International Conference on Distributed Computing Systems (ICDCS)
, pp. 28-29
-
-
Ye, F.1
Zhong, G.2
Lu, S.3
Zhang, L.4
-
30
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S., Setia, S. and Jajodia, S. (2003) 'LEAP: efficient security mechanisms for large-scale distributed sensor networks', Tenth ACM Conference on Computer and Communications Security, pp. 62-72.
-
(2003)
Tenth ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
31
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
Zhu, B., Wan, Z., Kankanhalli, M. S., Bao, F. and Deng, R. H. (2004a) 'Anonymous secure routing in mobile ad-hoc networks', IEEE 29th International Conference on Local Computer Networks (LCN'04), pp. 102-108.
-
(2004)
IEEE 29th International Conference on Local Computer Networks (LCN'04)
, pp. 102-108
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
-
32
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks
-
Zhu, S., Setia, S., Jajodia, S. and Ning, P. (2004b) 'An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks', IEEE Symposium on Security and Privacy, pp. 259-274.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 259-274
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|