-
1
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation Systems
-
Beth, T, Cot, N, Ingemarsson. I, eds, EUROCRYPT 1984, Springer, Heidelberg
-
Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson. I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335-338. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
2
-
-
0005908666
-
-
Information and Computation
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly Secure Key Distribution for Dynamic Conferences. Information and Computation 146(1), 1-23 (1998)
-
(1998)
Perfectly Secure Key Distribution for Dynamic Conferences
, vol.146
, Issue.1
, pp. 1-23
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
3
-
-
0037623983
-
Identity-Based Encryption from the Weil Pairing. SlAM
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SlAM. J. Computing 32(3), 586-615 (2003)
-
(2003)
J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
23244467182
-
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks
-
Du, W., Deng. J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228-258 (2005)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
7
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM, New York
-
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, ACM-CCS 2002, pp. 41-47. ACM, New York (2002)
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security, ACM-CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
8
-
-
57049185816
-
-
Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S., Wolthusen, S.D.: Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs, http://eprint.iacr.org/2008/308
-
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
-
-
Gennaro, R.1
Halevi, S.2
Krawczyk, H.3
Rabin, T.4
Reidt, S.5
Wolthusen, S.D.6
-
9
-
-
0036267543
-
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks
-
Hanaoka, G., Nishioka, T., Zheng, Y., Imai, H.: A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3), 293-303 (2002)
-
(2002)
Comput. J
, vol.45
, Issue.3
, pp. 293-303
-
-
Hanaoka, G.1
Nishioka, T.2
Zheng, Y.3
Imai, H.4
-
10
-
-
84947242701
-
Towards Hierarchical Identity-Based Encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer. Heidelberg
-
Horwitz, J., Lynn. B.: Towards Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer. Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
12
-
-
27744582346
-
Toward Hierarachical Identity-Based Cryptography for Tactical Networks
-
IEEE, Los Alamitos
-
Matt, B.: Toward Hierarachical Identity-Based Cryptography for Tactical Networks. In: Military Communications Conference. MILCOM 2004. pp. 727-735. IEEE, Los Alamitos (2004)
-
(2004)
Military Communications Conference. MILCOM
, pp. 727-735
-
-
Matt, B.1
-
13
-
-
33947173113
-
A hierarchical key pre-distribution scheme
-
IEEE, Los Alamitos
-
Ramkumar, M., Memon, N., Simha, R.: A hierarchical key pre-distribution scheme. In: Electro/Information Technolgy Conference, EIT 2005. IEEE, Los Alamitos (2005)
-
(2005)
Electro/Information Technolgy Conference, EIT
-
-
Ramkumar, M.1
Memon, N.2
Simha, R.3
-
15
-
-
33749984492
-
A comparison of MNT curves and supersingular curves
-
Page, D., Smart, N.P., Vercauteren, F.: A comparison of MNT curves and supersingular curves. Appl. Algebra Eng., Commun. Comput. 17(5), 379-392 (2006)
-
(2006)
Appl. Algebra Eng., Commun. Comput
, vol.17
, Issue.5
, pp. 379-392
-
-
Page, D.1
Smart, N.P.2
Vercauteren, F.3
-
16
-
-
47949101717
-
-
Balfe, S., Boklan, K.D., Klagsbrun, Z., Paterson, K.G.: Key Refreshing in Identity-based Cryptography and its Applications in MANET'S. In: Milcom (2007)
-
Balfe, S., Boklan, K.D., Klagsbrun, Z., Paterson, K.G.: Key Refreshing in Identity-based Cryptography and its Applications in MANET'S. In: Milcom (2007)
-
-
-
-
17
-
-
57049187162
-
-
NS-2: Open Source Network Simulator
-
NS-2: Open Source Network Simulator, http://www.isi.edu/nsnam/ns/
-
-
-
-
18
-
-
47949114698
-
Resource-Constrained Signal Propagation Modeling for Tactical
-
manuscript
-
Reidt, S., Ebinger, P., Wolthusen, S.D.: Resource-Constrained Signal Propagation Modeling for Tactical Networks (manuscript, 2006)
-
(2006)
Networks
-
-
Reidt, S.1
Ebinger, P.2
Wolthusen, S.D.3
-
19
-
-
57049087538
-
-
A Compromise-Resilient Scheme for Pairwise Key Establishment in Dynamic Sensor Networks. In: Zhang, W., Tran, M., Zhu, S., Cao, G. (eds.) MobiHoc (2007)
-
A Compromise-Resilient Scheme for Pairwise Key Establishment in Dynamic Sensor Networks. In: Zhang, W., Tran, M., Zhu, S., Cao, G. (eds.) MobiHoc (2007)
-
-
-
|