-
1
-
-
0038341106
-
A Key Management Scheme for Distributed Sensor Networks
-
ACM New York, NY, USA, pp, November
-
L. Eschenauer and V. D. Gligor, "A Key Management Scheme for Distributed Sensor Networks", in proceedings of the 9th ACM Conference on Computer and Communication Security (CCS'02), ACM New York, NY, USA, pp. 41-47, November 2002.
-
(2002)
proceedings of the 9th ACM Conference on Computer and Communication Security (CCS'02)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
2
-
-
33750023217
-
-
X. Du and Y. Xiao and M. Guizani and H. H. Chen, An Effective Key Management Scheme for Heterogeneous Sensor Networks, Ad Hoc Networks, 5, no. 1, pp. 24-34, June 2007.
-
X. Du and Y. Xiao and M. Guizani and H. H. Chen, "An Effective Key Management Scheme for Heterogeneous Sensor Networks", Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, June 2007.
-
-
-
-
3
-
-
23244467182
-
-
W. Du and J. Deng and Y. S. Han and P. K. Varshney and A. Khalili, A Pairwise Key Predistribution Scheme for Wireless Sensor Networks, ACM Transactions on Information and System Security, 8, no. 2, pp. 228-258, May 2005.
-
W. Du and J. Deng and Y. S. Han and P. K. Varshney and A. Khalili, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks", ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
-
-
-
-
4
-
-
34250659309
-
Key Management for Long-lived Sensor Networks in Hostile Environments
-
June
-
M. Chorzempa and J. M. Park and M. Eltoweissy, "Key Management for Long-lived Sensor Networks in Hostile Environments", Computer Communications, vol. 30, no. 9, pp. 1964-1979, June 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.9
, pp. 1964-1979
-
-
Chorzempa, M.1
Park, J.M.2
Eltoweissy, M.3
-
5
-
-
33144476837
-
Location-Based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks
-
February
-
Y. Zhang and W. Liu and W. Lou and Y. Fang, "Location-Based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks", IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247-260, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
6
-
-
33947309703
-
Secure Localization and Authentication in Ultra-wideband Sensor Networks
-
April
-
Y. Zhang and W. Liu and Y. Fang and D. Wu, "Secure Localization and Authentication in Ultra-wideband Sensor Networks", IEEE Journal on Selected Areas in Communications, vol. 24, no. 4, pp. 829-835, April 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
7
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
September
-
A. Perrig and R. Szewczyk and J. D. Tygar and V. Wen and D. E. Culler, "SPINS: Security Protocols for Sensor Networks", Wireless Networks, vol. 8, no. 5, pp. 521-534, September 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
8
-
-
33847120377
-
LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
November
-
S. Zhu and S. Setia and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500-528, November 2006.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
9
-
-
16644374371
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
February
-
D. Liu and P. Ning and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks", ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, February 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
10
-
-
48049095381
-
Exploiting Unidirectional Links for Key Establishment Protocols in Heterogeneous Sensor Networks
-
August
-
Y. Zhang and D. Gu and J. Li, "Exploiting Unidirectional Links for Key Establishment Protocols in Heterogeneous Sensor Networks", Computer Communications, vol. 31, no. 13, pp. 2959-2971, August 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.13
, pp. 2959-2971
-
-
Zhang, Y.1
Gu, D.2
Li, J.3
-
12
-
-
34247606829
-
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
-
June
-
P. Traynor and R. Kumar and H. Choi and G. Cao and S. Zhu and T. L. Parta, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks", IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 663-677, June 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.6
, pp. 663-677
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
Parta, T.L.6
-
13
-
-
34547411877
-
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks
-
September
-
Y. Zhou and Y. Fang, "A Two-Layer Key Establishment Scheme for Wireless Sensor Networks", IEEE Transactions on Mobile Computing, vol. 6, no. 9, pp. 1009-1020, September 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.9
, pp. 1009-1020
-
-
Zhou, Y.1
Fang, Y.2
|