-
3
-
-
0033357103
-
Securing ad hoc networks
-
Nov
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Netw. Mag., vol. 13, no. 6, pp. 24-30, Nov. 1999.
-
(1999)
IEEE Netw. Mag
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
84947273682
-
The sybil attack
-
Mar
-
J. Douceur, "The sybil attack," in Proc. IPTPS Workshop, Mar. 2002, pp. 251-260.
-
(2002)
Proc. IPTPS Workshop
, pp. 251-260
-
-
Douceur, J.1
-
6
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad-hoc networks," in Proc. 9th IEEE Int. Conf. Network Protocols, 2001, pp. 251-260.
-
(2001)
Proc. 9th IEEE Int. Conf. Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
7
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan./Mar
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan./Mar. 2003.
-
(2003)
IEEE Trans. Mobile Comput
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
9
-
-
84943517115
-
On the utility of distributed cryptography in P2P and MANETs: The case of membership control?
-
Nov
-
M. Narasimha, G. Tsudik, and J. H. Yi, "On the utility of distributed cryptography in P2P and MANETs: The case of membership control?," in Proc. 11th IEEE Int. Conf. Network Protocols, Nov. 2003, pp. 336-345.
-
(2003)
Proc. 11th IEEE Int. Conf. Network Protocols
, pp. 336-345
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
-
10
-
-
18244376871
-
Efficient and robust key management for large mobile ad-hoc networks
-
Jul
-
B. Zhu, F. Bao, R. H. Deng, M. S. Kankanhalli, and G. Wang, "Efficient and robust key management for large mobile ad-hoc networks," Comput. Netw. J., vol. 48, no. 4, pp. 657-682, Jul. 2005.
-
(2005)
Comput. Netw. J
, vol.48
, Issue.4
, pp. 657-682
-
-
Zhu, B.1
Bao, F.2
Deng, R.H.3
Kankanhalli, M.S.4
Wang, G.5
-
11
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Comput
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
17144398990
-
MOCA: Mobile certificate authority for wireless ad hoc networks
-
presented at the, Gaithersburg, MD, Apr
-
S. Yi and R. Kravets, "MOCA: Mobile certificate authority for wireless ad hoc networks," presented at the 2nd Annu. PKI Research Workshop, Gaithersburg, MD, Apr. 2003.
-
(2003)
2nd Annu. PKI Research Workshop
-
-
Yi, S.1
Kravets, R.2
-
14
-
-
33646839571
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
S.A. Camtepe and B. Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks," in Proc. 9th Eur. Symp. Research in Computer Security, 2004, pp. 346-358.
-
(2004)
Proc. 9th Eur. Symp. Research in Computer Security
, pp. 346-358
-
-
Camtepe, S.A.1
Yener, B.2
-
16
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Research Security Privacy, 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symp. Research Security Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
17
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington, DC, Oct. 27-31
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key pre-distribution scheme for wireless sensor networks," in Proc. 10th ACM Conf. Computer and Communications Security, Washington, DC, Oct. 27-31, 2003, pp. 42-51.
-
(2003)
Proc. 10th ACM Conf. Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
19
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Oct
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. 10th ACM Conf. Computer and Communications Security, Oct. 2003, pp. 62-72.
-
(2003)
Proc. 10th ACM Conf. Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
20
-
-
39049083533
-
Threshold key-establishment in distributed sensor networks using a multivariate scheme
-
Apr
-
F. Delgosha and F. Fekri, "Threshold key-establishment in distributed sensor networks using a multivariate scheme," in Proc. IEEE 25th INFOCOM, Apr. 2006, pp. 1-12.
-
(2006)
Proc. IEEE 25th INFOCOM
, pp. 1-12
-
-
Delgosha, F.1
Fekri, F.2
-
21
-
-
33748959977
-
Establishing pair-wise keys in heterogeneous sensor networks
-
Apr
-
P. Traynor, H. Choi, G. Cao, S. Zhu, and T. La Porta, "Establishing pair-wise keys in heterogeneous sensor networks," in Proc. IEEE 25th INFOCOM, Apr. 2006, pp. 1-12.
-
(2006)
Proc. IEEE 25th INFOCOM
, pp. 1-12
-
-
Traynor, P.1
Choi, H.2
Cao, G.3
Zhu, S.4
La Porta, T.5
-
22
-
-
31844450265
-
Public keys cryptography in sensor networks - Revisited
-
G. Gaubatz, J. Kaps, and B. Sunar, "Public keys cryptography in sensor networks - Revisited," in Proc. 1st Eur. Workshop on Security in Ad-Hoc and Sensor Networks, 2004, pp. 2-18.
-
(2004)
Proc. 1st Eur. Workshop on Security in Ad-Hoc and Sensor Networks
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.2
Sunar, B.3
-
23
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
presented at the, Santa Clara, CA, Oct
-
D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," presented at the 1st IEEE Int. Conf. Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, Oct. 2004.
-
(2004)
1st IEEE Int. Conf. Sensor and Ad Hoc Communications and Networks
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
24
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. Chang, "Sizzle: A standards-based end-to-end security architecture for the embedded internet," in. Proc. 3rd IEEE Percom, 2005, pp. 247-256.
-
(2005)
Proc. 3rd IEEE Percom
, pp. 247-256
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Chang, S.7
-
25
-
-
60449110611
-
SMOCK: A scalable method of cryptographic key management for mission-critical networks,
-
Comput. Sci, UIUCDCS-R-2006-2734
-
W. He, Y. Huang, K. Nahrstedt, and W. C. Lee, "SMOCK: A scalable method of cryptographic key management for mission-critical networks," UIUC Tech. Rep. Dept. Comput. Sci., UIUCDCS-R-2006-2734.
-
UIUC Tech. Rep. Dept
-
-
He, W.1
Huang, Y.2
Nahrstedt, K.3
Lee, W.C.4
-
26
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," Cryptobytes, vol. 5, no. 2, 2002.
-
(2002)
Cryptobytes
, vol.5
, Issue.2
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
|