-
1
-
-
0017930809
-
METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol.21, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. EIGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol.31, pp. 469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Eigamal, T.1
-
6
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks : A survey," Computer Networks, vol.38, no. 4, pp. 393-422, 2002. (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
8
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, California
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy, Berkeley, California, 2003, pp. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
8344262333
-
A key management scheme for wireless sensor networks using deplOYment knowledge
-
Hong Kong, China, March
-
W. Du, 1. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deplOYment knowledge," in 23rd Cotiference of the IEEE Communications Society (Infocom 04), Hong Kong, China, March 21-25 2004.
-
(2004)
23rd Cotiference of the IEEE Communications Society (Infocom '04)
, pp. 21-25
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
11
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
Washington DC, USA, October 27-31
-
W. Du, 1. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in ACM Conference on Computer and Communications Security (CCS'03), Washington DC, USA, October 27-31 2003, pp. 42-51.
-
(2003)
ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
12
-
-
84866860550
-
Improving key pre-distribution with deplOYment knowledge in static sensor networks
-
D. Liu and P. Ning, "Improving key pre-distribution with deplOYment knowledge in static sensor networks," ACM Transactions on Sensor Networks, vol.1, no. 2, pp. 204-239, 2005.
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, Issue.2
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
13
-
-
84883897746
-
A low-energy key management protocol for wireless sensor networks
-
Kerner-Antalya, Turkey, June 30-July 3
-
G. Jolly, M. Kuscu, P. Kokate, and M. Yuonis, "A low-energy key management protocol for wireless sensor networks," in Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC'03), Kerner-Antalya, Turkey, June 30-July 3 2003.
-
(2003)
Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC'03)
-
-
Jolly, G.1
Kuscu, M.2
Kokate, P.3
Yuonis, M.4
-
14
-
-
33750111807
-
An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.011, PII S157087050600045X, Security Issues in Sensor and Ad Hoc Networks
-
Cheng and D. Agrawal, "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks," Ad Hoc Networks (Elsevier), vol.5, no. 1, pp. 35-48, 2007. (Pubitemid 44592580)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 35-48
-
-
Cheng, Y.1
Agrawal, D.P.2
-
15
-
-
33646844958
-
A key reshuffling scheme for wireless sensor networks
-
Information Systems Security - First International Conference, ICISS 2005, Proceedings
-
A. K. Das, "A Key Reshuffling Scheme for Wireless Sensor Networks," in International Conference on Information Systems Security (ICISS 2005), Lecture Notes in Computer Science (LNCS), vol.3803, 2005, pp. 205-216, Springer-Verlag. (Pubitemid 43775408)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3803
, pp. 205-216
-
-
Das, A.K.1
-
16
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Berlin, August
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences;' in Advances in Cryptology- CRYPTO '92, LNCS 740, Berlin, August 1993, pp. 471-486.
-
(1993)
Advances in Cryptology- CRYPTO '92, LNCS 740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
18
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
DOI 10.1145/1053283.1053287
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on ltiformation and System Security, vol.8, no. 1, pp. 41-77, 2005. (Pubitemid 40479429)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Rongfang, L.I.3
-
19
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04
-
D. Huang, M. Mehta, D. Medhi, and L. Ham, "Location-aware key management scheme for wireless sensor networks," in Proceedings of the 2ndACMworkshop on Security ofad hoc and sensor networks SASN 04, 2004, pp. 29-42. (Pubitemid 40338675)
-
(2004)
Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
23
-
-
0022793132
-
HOW TO CONSTRUCT RANDOM FUNCTIONS.
-
DOI 10.1145/6490.6503
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," Journal of the ACM, vol.33, no. 4, pp. 792-807, October 1986. (Pubitemid 17462444)
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich Oded1
Goldwasser Shafi2
Micali Silvio3
-
24
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
DOI 10.1145/1218556.1218559
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Transactions on Sensor Networks, vol.2, no. 4, pp. 500-528, November 2006. (Pubitemid 46278640)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
26
-
-
78651551984
-
Two attacks on a sensor network key distribution scheme of cheng and agrawal
-
report 2008/326. [Online]. Available:
-
M. B. Paterson, R. Holloway, and D. R. Stinson, "Two attacks on a sensor network key distribution scheme of Cheng and Agrawal," in Cryptology ePrint Archive, 2008, report 2008/326. [Online]. Available: http://eprint.iacr.org/2008
-
(2008)
Cryptology ePrint Archive
-
-
Paterson, M.B.1
Holloway, R.2
Stinson, D.R.3
|