-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci: Wireless sensor networks: A survey. Computer Networks 38 (2002), 393-422.
-
(2002)
Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences. In E. F. Brickell (editor): Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992
-
Proceedings, Springer-Verlag, Berlin
-
C. Blundo, A. de Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung: Perfectly-secure key distribution for dynamic conferences. In E. F. Brickell (editor): Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings. Lecture Notes in Computer Science 740, 471-486, Springer-Verlag, Berlin, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
de Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
3
-
-
0038487088
-
Random key predis-tribution schemes for sensor networks
-
CA, USA, IEEE Computer Society, Washington
-
H. Chan, A. Perrig, D. X. Song: Random key predis-tribution schemes for sensor networks. In 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA. 197-213, IEEE Computer Society, Washington, 2003.
-
(2003)
2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
4
-
-
32844459414
-
A key pre-distribution scheme for sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney: A key pre-distribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable Secure Computing 3(1) (2006), 62-77.
-
(2006)
IEEE Transactions on Dependable Secure Computing
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
6
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
V. Atluri editor, Washingtion, DC, USA, November 18-22, ACM Press, New York
-
L. Eschenauer, V. D. Gligor: A key-management scheme for distributed sensor networks. In V. Atluri (editor): Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washingtion, DC, USA, November 18-22, 2002. 41-47, ACM Press, New York, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
7
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
S. Jajodia, V. Atluri, T. Jaeger editors, Washingtion, DC, USA, October 27-30, ACM Press, New York
-
D. Liu, P. Ning: Establishing pairwise keys in distributed sensor networks. In S. Jajodia, V. Atluri, T. Jaeger (editors): Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003. 52-61, ACM Press, New York, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
8
-
-
84866860550
-
Improving key predistribution with deployment knowledge in static sensor networks
-
D. Liu, P. Ning: Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 1 (2005), 204-239.
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
9
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
C. Pomerance editor, Advances in Cryptology-CRYPTO '87,AConfer-ence on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, Springer-Verlag, Berlin
-
R. C. Merkle: A digital signature based on a conventional encryption function. In C. Pomerance (editor): Advances in Cryptology-CRYPTO '87,AConfer-ence on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings. Lecture Notes in Computer Science 293, 369-378, Springer-Verlag, Berlin, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 369-378
-
-
Merkle, R.C.1
-
10
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, M. Galloway: A survey of key management schemes in wireless sensor networks. Computer Communications 30 (2007), 2314-2341.
-
(2007)
Computer Communications
, vol.30
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
12
-
-
57549087250
-
-
Y. Xue, H. Jürgensen: Maximum supported network coverage area and cost evaluation of key pre-distribution schemes. In F. Makedon, L. Bailie (editors): Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to As-sistive Environments, PETRA 2008, Athens, Greece, July 16-18, 2008.ACM International Conference Proceedings Series 282, Association for Computing Machinery, New York, 2008. [Article No. 42], 8 Pages.
-
Y. Xue, H. Jürgensen: Maximum supported network coverage area and cost evaluation of key pre-distribution schemes. In F. Makedon, L. Bailie (editors): Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to As-sistive Environments, PETRA 2008, Athens, Greece, July 16-18, 2008.ACM International Conference Proceedings Series 282, Association for Computing Machinery, New York, 2008. [Article No. 42], 8 Pages.
-
-
-
-
13
-
-
63149146677
-
-
Y. Xue, H. Jürgensen. Secure paths in wireless networks with real-world attackers, 2008. Manuscript, in preparation.
-
Y. Xue, H. Jürgensen. Secure paths in wireless networks with real-world attackers, 2008. Manuscript, in preparation.
-
-
-
|