-
1
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, Vol. 13, 1999, pp. 24-30.
-
(1999)
IEEE Network
, vol.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
3
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, Vol. 2, 2003, pp. 52-64.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
4
-
-
0003978251
-
Key management for multicast: Issues and architectures
-
Request for Comments, RFC 2627
-
D. Wallner, E. Harder, and R. Agee, "Key management for multicast: issues and architectures," Request for Comments, RFC 2627, 1998.
-
(1998)
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
6
-
-
0004135561
-
Key management for large dynamic groups: One-way function trees and amortized initialization
-
Internet Draft, draft-balenson-groupkeyrngmtjoft-00. txt
-
D. M. Balenson, D. McGrew, and A. Sherman, "Key management for large dynamic groups: One-way function trees and amortized initialization," in IRTF SMUG Meeting, Internet Draft, draft-balenson-groupkeyrngmtjoft-00. txt, 1999.
-
(1999)
IRTF SMUG Meeting
-
-
Balenson, D.M.1
McGrew, D.2
Sherman, A.3
-
7
-
-
84942438500
-
Batch rekeying for secure group communications
-
X. S. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, "Batch rekeying for secure group communications," in Proceedings of the 10th International Conference on World Wide Web, 2001, pp. 525-534.
-
(2001)
Proceedings of the 10th International Conference on World Wide Web
, pp. 525-534
-
-
Li, X.S.1
Yang, Y.R.2
Gouda, M.G.3
Lam, S.S.4
-
8
-
-
0003460574
-
Group key management protocol architecture
-
IETF Request for Comments, RFC 2094
-
H. Harney and C. Muckenhirn, "Group key management protocol architecture," IETF Request for Comments, RFC 2094, 1997.
-
(1997)
-
-
Harney, H.1
Muckenhirn, C.2
-
9
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan and A. Perrig, "Security and privacy in sensor networks," IEEE Computer Magazine, 2003, pp. 103-105.
-
(2003)
IEEE Computer Magazine
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
10
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in IEEE INFOCOM, Vol. 1, 2004, pp. 586-597.
-
(2004)
IEEE INFOCOM
, vol.1
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
11
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement," ACM Transactions on Information and System Security, Vol. 7, 2004, pp. 60-96.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
12
-
-
0034247455
-
Key agreement in dynamic peer groups
-
M. Steiner, G. Tsudik, and M. Waidner, "Key agreement in dynamic peer groups," IEEE Transactions on Parallel and Distributed Systems, Vol. 11, 2000, pp. 769-780.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
14
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Proceedings of Advances in Cryptology -EUROCRYPT
-
R. Blom, "An optimal class of symmetric key generation systems," in Proceedings of Advances in Cryptology -EUROCRYPT, LNCS 209, 1984, pp. 335-338.
-
(1984)
LNCS
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
17
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
D. Huang, M. Mehta, D. Medhi, and L. Harn, "Location-aware key management scheme for wireless sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, pp. 29-42.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
18
-
-
10044284351
-
LEAP: Efficient security mechanisms for largescale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for largescale distributed sensor networks," in Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 62-72.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
19
-
-
0030609312
-
lolus: A framework for scalable secure multicasting
-
S. Mittra, "lolus: a framework for scalable secure multicasting," in Proceedings of ACMSIGCOMM, Vol. 27, 1997, pp. 277-288.
-
(1997)
Proceedings of ACMSIGCOMM
, vol.27
, pp. 277-288
-
-
Mittra, S.1
-
20
-
-
0035728669
-
Secure group communications for wireless networks
-
B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang, "Secure group communications for wireless networks," in IEEE Military Communications Conference on Communications for NetworkCentric Operations: Creating the Information Force, Vol. 1, 2001, pp. 113-117.
-
(2001)
IEEE Military Communications Conference on Communications for NetworkCentric Operations: Creating the Information Force
, vol.1
, pp. 113-117
-
-
DeCleene, B.1
Dondeti, L.2
Griffin, S.3
Hardjono, T.4
Kiwior, D.5
Kurose, J.6
Towsley, D.7
Vasudevan, S.8
Zhang, C.9
-
21
-
-
84943243577
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
R. D. Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga, "LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks," in Proceedings of International Conference on Parallel Processing Workshops, 2003, pp. 397-406.
-
(2003)
Proceedings of International Conference on Parallel Processing Workshops
, pp. 397-406
-
-
Pietro, R.D.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.5
-
22
-
-
0345565893
-
A survey of key management for secure group communication
-
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, Vol. 35, 2003, pp. 309-329.
-
(2003)
ACM Computing Surveys
, vol.35
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
23
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
J. P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001, pp. 146-155.
-
(2001)
Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 146-155
-
-
Hubaux, J.P.1
Buttyán, L.2
Capkun, S.3
-
24
-
-
57049186651
-
-
Wiley-Interscience, Ch. 3, 2004, pp
-
S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mobile Ad Hoc Networking, Wiley-Interscience, Ch. 3, 2004, pp. 94.
-
Mobile Ad Hoc Networking
, pp. 94
-
-
Basagni, S.1
Conti, M.2
Giordano, S.3
Stojmenovic, I.4
|