-
2
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Y. Zhang R. W. Yeung and N. Cai "Location-based compromisetolerant security mechanisms for wireless sensor networks" IEEE J. Select. Areas Commun., vol. 24, No. 2, pp. 247-260, Feb. 2006. (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
3
-
-
51349102138
-
Secure Broadcast Communication in Wired and Wireless Networks
-
and, Boston
-
A. Perrig and J. D. Tygar Secure Broadcast Communication in Wired and Wireless Networks. Boston: Kluwer Academic, 2003.
-
(2003)
Kluwer Academic
-
-
Perrig, A.1
Tygar, J.D.2
-
4
-
-
23944459661
-
Public key cryptography in sensor networks-revisited
-
and, in, Eds., Berlin: Springer-Verlag
-
G. Gaubatz J.-P. Kaps and B. Sunar "Public key cryptography in sensor networks-revisited" in Proc. Secur. in Ad-hoc and Sensor Net. - ESAS'04, ser. Lect. Notes Comput. Sci. C. Castelluccia et al. Eds., vol. 3313. Berlin: Springer-Verlag, 2005, pp. 2-18.
-
(2005)
Proc. Secur. in Ad-hoc and Sensor Net. - ESAS'04, ser. Lect. Notes Comput. Sci.
, vol.3313
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
Castelluccia, C.4
-
5
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
A. S. Wander et al. "Energy analysis of public-key cryptography for wireless sensor networks" in Proc. IEEE Int. Conf. Pervasive Comput. Commun. - PerCom'05, Mar. 2005, pp. 324-328. (Pubitemid 43727945)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
10
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
and
-
D. Liu P. Ning and R. Li "Establishing pairwise keys in distributed sensor networks" ACM Trans. Inform. Syst. Secur., vol. 8, No. 1, pp. 41-77, 2005.
-
(2005)
ACM Trans. Inform. Syst. Secur.
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
12
-
-
0020890723
-
-
R. Blom "Non-public key distribution" in Proc. Adv. Cryptol. - CRYPTO'82 D. Chaum R. L. Rivest and A. T. Sherman Eds. NY: Plenum Publishing, 1982, pp. 231-236. (Pubitemid 14519635)
-
(1983)
NON-PUBLIC KEY DISTRIBUTION
, pp. 231-236
-
-
Blom Rolf1
-
13
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
in, Ed., Berlin: Springer-Verlag
-
C. Blundo et al. "Perfectly-secure key distribution for dynamic conferences" in Proc. Adv. Cryptol. - CRYPTO'92, ser. Lect. Notes Comput. Sci. E. F. Brickell, Ed., vol. 740. Berlin: Springer-Verlag, 1992, pp. 471-486.
-
(1992)
Proc. Adv. Cryptol. - CRYPTO'92, ser. Lect. Notes Comput. Sci.
, vol.740
, pp. 471-486
-
-
Blundo, C.1
-
15
-
-
39049083533
-
Threshold key-establishment in distributed sensor networks using a multivariate scheme
-
in, CD-ROM
-
- "Threshold key-establishment in distributed sensor networks using a multivariate scheme" in Proc. IEEE Conf. Comput. Commun. - INFOCOM'06 CD-ROM.
-
Proc. IEEE Conf. Comput. Commun. - INFOCOM'06
-
-
-
19
-
-
20344370962
-
On connectivity properties of large-scale wireless sensor networks
-
and, in, Santa Clara, CA, Oct, CD-ROM
-
H. Pishro-Nik K. Chan and F. Fekri "On connectivity properties of large-scale wireless sensor networks" in Proc. First Ann. IEEE Commun. Society Conf. on Sensor Commun. and Net., Santa Clara, CA, Oct. 2004 CD-ROM.
-
(2004)
Proc. First Ann. IEEE Commun. Society Conf. on Sensor Commun. and Net.
-
-
Pishro-Nik, H.1
Chan, K.2
Fekri, F.3
|