-
1
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
H. Chan, V. Gligor, A. Perrig, and G. Muralidharan. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing (TDSC), 2(3):233-247, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing (TDSC)
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.2
Perrig, A.3
Muralidharan, G.4
-
4
-
-
56749151138
-
Pre-authentication filters: Providing DoS resistance for signature-based broadcast authentication in wireless sensor networks
-
Apr
-
Q. Dong, D. Liu, and P. Ning. Pre-authentication filters: Providing DoS resistance for signature-based broadcast authentication in wireless sensor networks. In Proceedings of ACM Conference on Wireless Network Security (WiSec), Apr. 2008.
-
(2008)
Proceedings of ACM Conference on Wireless Network Security (WiSec)
-
-
Dong, Q.1
Liu, D.2
Ning, P.3
-
9
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communication (PerCom), 2005.
-
(2005)
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communication (PerCom)
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
13
-
-
85000276942
-
Multi-level uTESLA: Broadcast authentication for distributed sensor networks
-
Nov
-
D. Liu and P. Ning. Multi-level uTESLA: Broadcast authentication for distributed sensor networks. ACM Transactions in Embedded Computing Systems (TECS), 3(4):800-836, Nov. 2004.
-
(2004)
ACM Transactions in Embedded Computing Systems (TECS)
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
14
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
July
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia. Practical broadcast authentication in sensor networks. In Proceedings of Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pages 118-129, July 2005.
-
(2005)
Proceedings of Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous)
, pp. 118-129
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
16
-
-
84978428047
-
TAG: A tiny aggregation service for ad-hoc sensor networks
-
36SI
-
S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. TAG: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Open Syst. Rev., 36(SI): 131-146, 2002.
-
(2002)
SIGOPS Open Syst. Rev
, pp. 131-146
-
-
Madden, S.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
21
-
-
41849094781
-
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
-
Jan
-
P. Ning, A. Liu, and W. Du. Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(1), Jan. 2008.
-
(2008)
ACM Transactions on Sensor Networks (TOSN)
, vol.4
, Issue.1
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
22
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. SPINS: Security protocols for sensor networks. Wirel. Netw., 8(5):521-534, 2002.
-
(2002)
Wirel. Netw
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
26
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
-
May
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, pages 259-271, May 2004.
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|