-
1
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA
-
L. Eschenauer and V. Gligor, "A Key-management Scheme for Distributed Sensor Networks", Proc. 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2002, pp. 41-47.
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
2
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks", Proc. IEEE Symposium on Security and Privacy, 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
67549091275
-
Efficient ID-based threshold random key pre-distribution scheme for wireless sensor networks
-
to appear
-
T. T. Dai and C. S. Hong, "Efficient ID-based Threshold Random Key Pre-distribution Scheme for Wireless Sensor Networks", IEICE TRANS. Comm., to appear, 2008.
-
(2008)
IEICE TRANS. Comm.
-
-
Dai, T.T.1
Hong, C.S.2
-
4
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
DOI 10.1145/1053283.1053287
-
D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks", ACM Trans. Inf. Syst. Secur., vol.8, 2005, pp. 41-77. (Pubitemid 40479429)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Rongfang, L.I.3
-
5
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks", ACM Trans. Inf. Syst. Secur., vol.8, 2005, pp. 228-258. (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
6
-
-
33750342024
-
A collusion attack on pairwise key predistribution schemes for distributed sensor networks
-
DOI 10.1109/PERCOMW.2006.3, 1598981, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
-
T. Moore, "A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks", Proc. 4th IEEE Conference on Pervasive Computing and Communications, 2006. (Pubitemid 44612586)
-
(2006)
Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
, vol.2006
, pp. 251-255
-
-
Moore, T.1
-
8
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004
-
R. Anderson, H. Chan, and A. Perrig, "Key Infection: Smart Trust for Smart Dust", Proc. 12th IEEE Conference on Network Protocols, 2004, pp. 206-215. (Pubitemid 40574711)
-
(2004)
Proceedings - International Conference on Network Protocols, ICNP
, pp. 206-215
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
9
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
DOI 10.1145/1218556.1218559
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", ACM Trans. Sen. Netw., vol.2, 2006, pp. 500-528. (Pubitemid 46278640)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
10
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach", Proc. IEEE INFOCOM'05, 2005, pp. 503-514. (Pubitemid 41390846)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.1
, pp. 503-514
-
-
Zhang, W.1
Cao, G.2
-
11
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks", Proc. IEEE Symposium on Security and Privacy, 2005, pp. 49-63. (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
12
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge", Proc. IEEE INFOCOMV4, 2004, pp. 586-597.
-
(2004)
Proc. IEEE INFOCOM'04
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
13
-
-
26444506296
-
Efficient constructions for one-way hash chains
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Y. C. Hu, M. Jakobsson, and A. Perrig, "Efficient Constructions for One-Way Hash Chains", Applied Cryptography and Network Security, 2005, pp. 423-441. (Pubitemid 41422131)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 423-441
-
-
Hu, Y.-C.1
Jakobsson, M.2
Perrig, A.3
-
14
-
-
40949096414
-
Measurement of energy costs of security in wireless sensor nodes
-
C. C. Chang, S. Muftic, and D. J. Nagel, "Measurement of Energy Costs of Security in Wireless Sensor Nodes", Proc. 16th International Conference on Computer Communications and Networks, 2007, pp. 95-102.
-
(2007)
Proc. 16th International Conference on Computer Communications and Networks
, pp. 95-102
-
-
Chang, C.C.1
Muftic, S.2
Nagel, D.J.3
|