-
2
-
-
0032178082
-
Secure group communications using key graphs
-
C. K. Wong M. G. Gouda and S. S. Lam "Secure group communications using key graphs" in Proc. ACM SIGCOMM'98, pp. 68-79, 1998. (Pubitemid 128566448)
-
(1998)
Computer Communication Review
, vol.28
, Issue.4
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
4
-
-
0842267605
-
High-speed ECC based kerberos authentication protocol for wireless application
-
in, San Francisco, CA
-
O. M. Erdem "High-speed ECC based kerberos authentication protocol for wireless application" in Proc. IEEE GLOBECOM '03 Commun. Security Symposium, San Francisco, CA, 2003.
-
(2003)
Proc. IEEE GLOBECOM '03 Commun. Security Symposium
-
-
Erdem, O.M.1
-
5
-
-
0035101078
-
Toward self-organized mobile ad hoc networks: the Terminodes project
-
and
-
J. P. Hubaux T. Gross J. Y. Le Boudec and M. Vetterli "Toward self-organized mobile ad hoc networks: the Terminodes project" IEEE Commun., vol. 39, no. 1, pp. 118-124, 2001.
-
(2001)
IEEE Commun.
, vol.39
, Issue.1
, pp. 118-124
-
-
Hubaux, J.P.1
Gross, T.2
Le Boudec, J.Y.3
Vetterli, M.4
-
6
-
-
34247224664
-
Key distribution mechanisms for wireless sensor networks: a survey
-
and, Department of Computer Science, Rensselaer Polytechnic Institute, 512005
-
A. C. Seyit and Y. Bulent "Key distribution mechanisms for wireless sensor networks: a survey" Technical Report TR-05-07 Department of Computer Science, Rensselaer Polytechnic Institute, 512005.
-
Technical Report TR-05-07
-
-
Seyit, A.C.1
Bulent, Y.2
-
7
-
-
34547411877
-
A two-layer key establishment scheme for wireless sensor networks
-
DOI 10.1109/TMC.2007.1008
-
Y. Zhou and Y. Fang "A two-layer key establishment scheme for wireless sensor networks" IEEE Trans. Mob. Comp., vol. 6, no. 9, pp. 1009-1020, Sept. 2007. (Pubitemid 47171282)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.9
, pp. 1009-1020
-
-
Zhou, Y.1
Fang, Y.2
-
8
-
-
3042846801
-
A secure conference scheme for mobile communications
-
and, Nov
-
X. Yi C. Siew C. Tan and Y. Ye "A secure conference scheme for mobile communications" IEEE Trans. Wireless Commun., vol. 2, no. 6, pp. 1168-1177, Nov. 2003.
-
(2003)
IEEE Trans. Wireless Commun.
, vol.2
, Issue.6
, pp. 1168-1177
-
-
Yi, X.1
Siew, C.2
Tan, C.3
Ye, Y.4
-
9
-
-
84947273176
-
Traitor tracing with constant transmission rate
-
and
-
A. Kiayias and M. Yung "Traitor tracing with constant transmission rate" Advances Cryptology-Eurocrypt '02, LNCS, vol. 2332, pp. 450-465, 2002.
-
(2002)
Advances Cryptology-Eurocrypt '02, LNCS
, vol.2332
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
11
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Financial Cryptography
-
M. Naor and B. Pinkas "Efficient trace and revoke schemes" Financial Cryptography '2000, LNCS, vol. 1962, pp. 1-21, 2000. (Pubitemid 33359593)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
15
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
and, Mar
-
K. Hwang and C. Chang "A self-encryption mechanism for authentication of roaming and teleconference services" IEEE Trans. Wireless Commun., vol. 2, no. 2, pp. 400-407, Mar. 2003.
-
(2003)
IEEE Trans. Wireless Commun.
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.1
Chang, C.2
-
16
-
-
79952238646
-
Self-healing key distribution with revocation
-
and, in
-
J. Staddon S. Miner M. Franklin D. Balfanz M. Malkin and D. Dean "Self-healing key distribution with revocation" in Proc. IEEE Symposium Security Privacy, pp. 224-240, 2002.
-
(2002)
Proc. IEEE Symposium Security Privacy
, pp. 224-240
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
17
-
-
26444491036
-
Efficient self-healing key distribution with revocation capability
-
and, in
-
D. Liu P. Ning and K. Sun "Efficient self-healing key distribution with revocation capability" in Proc. 10th ACM, 2003.
-
(2003)
Proc. 10th ACM
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
21
-
-
33646147367
-
Self-healing key distribution schemes with sponsorization
-
in
-
G. Sáez "Self-healing key distribution schemes with sponsorization" in Proc. International Federation Information Processing, IFIP'05, LNCS, vol. 3677, pp. 22-31, 2005.
-
(2005)
Proc. International Federation Information Processing, IFIP'05, LNCS
, vol.3677
, pp. 22-31
-
-
Sáez, G.1
-
22
-
-
36349017874
-
Improved self-healing key distribution with revocation in wireless sensor network
-
DOI 10.1109/WCNC.2007.549, 4204725, 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007
-
R. Dutta and S. Mukhopadhyay "Improved self-healing key distribution with revocation in wireless sensor network" in Proc. Wireless Commun. Networking Conf., pp. 2963-2968, 2007. (Pubitemid 350139899)
-
(2007)
IEEE Wireless Communications and Networking Conference, WCNC
, pp. 2965-2970
-
-
Dutta, R.1
Mukhopadhyay, S.2
-
24
-
-
27644512043
-
An efficient key distribution scheme with self-healing properties
-
and
-
T. M. Cover and J. A. Thomas "An efficient key distribution scheme with self-healing properties" IEEE Commun. Lett., vol. 9, pp. 759-761, 2005.
-
(2005)
IEEE Commun. Lett.
, vol.9
, pp. 759-761
-
-
Cover, T.M.1
Thomas, J.A.2
-
25
-
-
57049157755
-
A self-healing key distribution scheme with novel properties
-
and
-
B. Tian and M. He "A self-healing key distribution scheme with novel properties" International J. Network Security, vol. 7, no. 2, pp. 147-152, 2008.
-
(2008)
International J. Network Security
, vol.7
, Issue.2
, pp. 147-152
-
-
Tian, B.1
He, M.2
-
26
-
-
52049095692
-
Self-healing group key distribution
-
and
-
M. J. Bohio and A. Miri "Self-healing group key distribution" International J. Network Security, vol. 1, no. 2, pp. 110-117, 2005.
-
(2005)
International J. Network Security
, vol.1
, Issue.2
, pp. 110-117
-
-
Bohio, M.J.1
Miri, A.2
-
27
-
-
33750008721
-
Self-healing group key distribution with time-limited node revocation for wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.007, PII S1570870506000448, Security Issues in Sensor and Ad Hoc Networks
-
Y. Jiang C. Lin M. Shi and X. Shen "Self-healing group key distribution with time-limited node revocation for wireless sensor networks" Ad Hoc Networks, vol. 5, pp. 14-23, 2007. (Pubitemid 44573003)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 14-23
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
28
-
-
0003285503
-
Group Key Management Protocol (GKMP) specification
-
H. Harney and C. Muckenhirn "Group Key Management Protocol (GKMP) specification" RFC 2093 1997.
-
(1997)
RFC
, vol.2093
-
-
Harney, H.1
Muckenhirn, C.2
-
30
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
and, Sept
-
Y. Jiang C. Lin X. Shen and M. Shi "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks" IEEE Trans. Wireless Commun., vol. 5, no. 19, pp. 2569-2577, Sept. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.19
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
31
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
Advances in Cryptology - CRYPTO 2001
-
D. Naor M. Naor and J. Lotspiech "Revocation and tracing schemes for stateless receivers" Advances Cryptology-Crypto '01, LNCS, vol. 2139, pp. 41-62, 2001. (Pubitemid 33317907)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
32
-
-
0013138808
-
Dynamic traitor tracing
-
DOI 10.1007/s00145-001-0006-7
-
A. Fiat and T. Tessa "Dynamic traitor tracing" J. Cryptology, vol. 14, pp. 211-223, 2001. (Pubitemid 33770280)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.3
, pp. 211-223
-
-
Fiat, A.1
-
33
-
-
65949114720
-
Special matrices of mathematical physics: stochastic, circulant and bell matrices
-
in
-
R. Aldrovandi "Special matrices of mathematical physics: stochastic, circulant and bell matrices" in Proc. Singapore: World Scientific, 2001.
-
(2001)
Proc. Singapore: World Scientific
-
-
Aldrovi, R.1
|