-
1
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, pp. 324-328 (2005)
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
2
-
-
20344381294
-
-
Malan, D.J., Welsh, M., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In: IEEE SECON (2004)
-
Malan, D.J., Welsh, M., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In: IEEE SECON (2004)
-
-
-
-
3
-
-
47249103825
-
Energy-Efficient Hybrid Key Management Protocol for Wireless Sensor Networks
-
Landstra, T., Zawodniok, M., Jagannathan, S.: Energy-Efficient Hybrid Key Management Protocol for Wireless Sensor Networks. In: 32nd IEEE Conference on Local Computer Networks, pp. 1009-1016 (2007)
-
(2007)
32nd IEEE Conference on Local Computer Networks
, pp. 1009-1016
-
-
Landstra, T.1
Zawodniok, M.2
Jagannathan, S.3
-
4
-
-
33646713710
-
-
Cao, X., Huang, M., Chen, Y., Chen, G.: Hybrid Authentication and Key Management Scheme for WSANs. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) ISPA-WS 2005. LNCS, 3759, pp. 454-465. Springer, Heidelberg (2005)
-
Cao, X., Huang, M., Chen, Y., Chen, G.: Hybrid Authentication and Key Management Scheme for WSANs. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) ISPA-WS 2005. LNCS, vol. 3759, pp. 454-465. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
33646918277
-
Dynamic key management in sensor networks
-
Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine 44(4), 122-130 (2006)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 122-130
-
-
Eltoweissy, M.1
Moharrum, M.2
Mukkamala, R.3
-
6
-
-
4243082091
-
Security in wireless sensor networks. Communications of the ACM, Special Issue on Wireless Sensor
-
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM, Special Issue on Wireless Sensor Networks 47(6), 53-57 (2004)
-
(2004)
Networks
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
8
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM, pp. 586-597 (2004)
-
(2004)
IEEE INFOCOM
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
9
-
-
70350631289
-
-
Personal Wireless Communications
-
Law, Y., Corin, R., Etalle, S., Hartel, P.: A formally verified decentralized key management for wireless sensor networks. Personal Wireless Communications (2003)
-
(2003)
A formally verified decentralized key management for wireless sensor networks
-
-
Law, Y.1
Corin, R.2
Etalle, S.3
Hartel, P.4
-
10
-
-
0036738266
-
-
Wireless Networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D.: Spins: Security protocols for sensor networks. Wireless Networks (2002)
-
(2002)
Spins: Security protocols for sensor networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
-
11
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Leap: Efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security CCS (2003)
-
(2003)
10th ACM Conference on Computer and Communications Security CCS
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
12
-
-
70350667305
-
-
Eltoweissy, M., et al.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Sys. Mgmt., Special Issue on Network Security, 332b (2004)
-
Eltoweissy, M., et al.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Sys. Mgmt., Special Issue on Network Security, 332b (2004)
-
-
-
-
15
-
-
84948991087
-
-
Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, 950, pp. 275-286. Springer, Heidelberg (1995)
-
Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275-286. Springer, Heidelberg (1995)
-
-
-
-
17
-
-
47849101266
-
-
Riaz, R., Akbar, A.H., Hasan, M., Kim, K., Lhee, K., Naureen, A., Akram, A., Ahmed, H.F.: Key Management Scheme for Sensor Networks with Proactive Key Revocation and Sleep State Consideration. In: Li, K., Jesshope, C., Jin, H., Gaudiot, J.-L. (eds.) NPC 2007. LNCS, 4672, pp. 368-373. Springer, Heidelberg (2007)
-
Riaz, R., Akbar, A.H., Hasan, M., Kim, K., Lhee, K., Naureen, A., Akram, A., Ahmed, H.F.: Key Management Scheme for Sensor Networks with Proactive Key Revocation and Sleep State Consideration. In: Li, K., Jesshope, C., Jin, H., Gaudiot, J.-L. (eds.) NPC 2007. LNCS, vol. 4672, pp. 368-373. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
70350664856
-
-
Crossbow Technology inc
-
Crossbow Technology inc., http://www.xbow.com
-
-
-
|