-
2
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Springer, Berlin
-
Blundo C., Santix A.D., Herzberg A., Kutten S., Vaccaro U., and Yung M. Perfectly-secure key distribution for dynamic conferences. Proceedings of the 12th annual international cryptology conference on advances in cryptology (1992), Springer, Berlin 471-486
-
(1992)
Proceedings of the 12th annual international cryptology conference on advances in cryptology
, pp. 471-486
-
-
Blundo, C.1
Santix, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
3
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advance in cryptology-crypto
-
Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Advance in cryptology-crypto, Lecture notes in computer science, vol. 2139, 2001. p. 213-29.
-
(2001)
Lecture notes in computer science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
35248874429
-
Multipurpose identity-based signcryption, a Swiss army knife for identity-based cryptography
-
Proceedings of the 23rd international conference on advances in cryptology
-
Boyen X. Multipurpose identity-based signcryption, a Swiss army knife for identity-based cryptography. In: Proceedings of the 23rd international conference on advances in cryptology, Lecture notes in computer science, vol. 2729, 2003. p. 383-399.
-
(2003)
Lecture notes in computer science
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
5
-
-
52049119700
-
Securing wireless sensor networks: security architectures
-
Boyle D., and Newe T. Securing wireless sensor networks: security architectures. Journal of Networks 3 1 (2008) 65-77
-
(2008)
Journal of Networks
, vol.3
, Issue.1
, pp. 65-77
-
-
Boyle, D.1
Newe, T.2
-
6
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Camtepe S.A., and Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking (TON) 15 2 (2007) 346-358
-
(2007)
IEEE/ACM Transactions on Networking (TON)
, vol.15
, Issue.2
, pp. 346-358
-
-
Camtepe, S.A.1
Yener, B.2
-
7
-
-
34247224664
-
Key distribution mechanisms for wireless sensor networks: A survey
-
Technical report TR-05-07;
-
Camtepte SA, Yener B. Key distribution mechanisms for wireless sensor networks: a survey. Technical report TR-05-07; 2005.
-
(2005)
-
-
Camtepte, S.A.1
Yener, B.2
-
9
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
Miami, FL, USA, March
-
Chan H, Perrig A. PIKE: peer intermediaries for key establishment in sensor networks. In: Proceedings of the 24th annual joint conference of the IEEE computer and communications societies (INFOCOM '05), Miami, FL, USA, March 2005. p. 524-35.
-
(2005)
Proceedings of the 24th annual joint conference of the IEEE computer and communications societies (INFOCOM '05)
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
10
-
-
10444246846
-
Identity-based authenticated key agreement protocols from pairings
-
Technical report; 2002, ePrint Archive, Report 2002/184
-
Chen L, Kudla C. Identity-based authenticated key agreement protocols from pairings. Technical report; 2002, ePrint Archive, Report 2002/184 〈http://eprint.iacr.org/2002/184〉.
-
-
-
Chen, L.1
Kudla, C.2
-
12
-
-
75149140029
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
Di Pietro R, Mancini LV, Law YW, Etalle S, Havinga P. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks. In: First international workshop on wireless security and privacy (WiSPr 03), 2003.
-
(2003)
First international workshop on wireless security and privacy (WiSPr 03)
-
-
Di Pietro, R.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.5
-
13
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
IEEE Press, Hong Kong
-
Du W., Han Y.S., Chen S., and Varshney P.K. A key management scheme for wireless sensor networks using deployment knowledge. Proceedings of IEEE INFOCOM04 (2004), IEEE Press, Hong Kong 586-597
-
(2004)
Proceedings of IEEE INFOCOM04
, pp. 586-597
-
-
Du, W.1
Han, Y.S.2
Chen, S.3
Varshney, P.K.4
-
14
-
-
23244467182
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du W., Deng J., Han Y.S., Varshney P., Katz J., and Khalili A. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC) 8 2 (2005) 228-258
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
Katz, J.5
Khalili, A.6
-
15
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
May
-
Du W, Wang R, Ning P. An efficient scheme for authenticating public keys in sensor networks. In: Proceeding of the MobiHoc, May 2005b. p. 58-67.
-
(2005)
Proceeding of the MobiHoc
, pp. 58-67
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
19
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA
-
Eschenauer L, Gligor BD. A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communication security, Washington, DC, USA, 2002. p. 41-7.
-
(2002)
Proceedings of the 9th ACM conference on computer and communication security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, B.D.2
-
21
-
-
27244436587
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
August
-
Gura N, Patel A, Wander A, Eberle H, Shantz S. Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: 2004 workshop on cryptographic hardware and embedded systems, August 2004.
-
(2004)
2004 workshop on cryptographic hardware and embedded systems
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
24
-
-
25844530844
-
New constructions on broadcast encryption and key pre-distribution schemes
-
IEEE Press, Miami
-
Huang C., and Du D. New constructions on broadcast encryption and key pre-distribution schemes. Proceedings of IEEE INFOCOM05 (2005), IEEE Press, Miami 515-523
-
(2005)
Proceedings of IEEE INFOCOM05
, pp. 515-523
-
-
Huang, C.1
Du, D.2
-
25
-
-
1542286901
-
Fast authenticated key establishment protocols for self-organizing sensor networks
-
ACM Press, New York
-
Huang Q., Cukier J., Kobayashi H., Liu B., and Zhang J. Fast authenticated key establishment protocols for self-organizing sensor networks. Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications (2003), ACM Press, New York 141-150
-
(2003)
Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
26
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
ACM Press, Washington, DC, USA
-
Huang D., Mehta M., Medhi D., and Harn L. Location-aware key management scheme for wireless sensor networks. Proceedings of ACM workshop on security of ad hoc and sensor networks (SASN04) (2004), ACM Press, Washington, DC, USA 29-42
-
(2004)
Proceedings of ACM workshop on security of ad hoc and sensor networks (SASN04)
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
27
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: Mobile computing and networking, 2000. p. 56-67.
-
(2000)
Mobile computing and networking
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
32
-
-
24144503356
-
Deterministic key predistribution schemes for distributed sensor networks
-
Proceedings of ACM symposium on applied computing, Waterloo, Canada, 2005
-
Lee J, Stinson DR. Deterministic key predistribution schemes for distributed sensor networks. In: Proceedings of ACM symposium on applied computing 2004, Lecture notes in computer science, vol. 3357, 2005, Waterloo, Canada, 2004. p. 294-307.
-
(2004)
Lecture notes in computer science
, vol.3357
, pp. 294-307
-
-
Lee, J.1
Stinson, D.R.2
-
35
-
-
84866860550
-
Improving key pre-distribution with deployment knowledge in static sensor networks
-
Liu D., and Ning P. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 1 2 (2005) 204-239
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, Issue.2
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
39
-
-
84941637905
-
Signing on a Postcard
-
Proceedings of financial cryptography
-
Naccache D, Stern J. Signing on a Postcard. In: Proceedings of financial cryptography, Lecture notes in computer science, vol. 1962, 2000, pp. 121-35.
-
(2000)
Lecture notes in computer science
, vol.1962
, pp. 121-135
-
-
Naccache, D.1
Stern, J.2
-
41
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
Perrig A, Szewczyk R, Wen V, Cullar D, Tygar JD. SPINS: security protocols for sensor networks. In: Proceedings of the 7th annual ACM/IEEE international conference on mobile computing and networking, July 2001. p. 189-99.
-
(2001)
Proceedings of the 7th annual ACM/IEEE international conference on mobile computing and networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.D.5
-
45
-
-
85020598353
-
Identity-based crytosystems and signature schemes
-
Advances in Cryptology-Crypto84, Berlin: Springer;
-
Shamir A. Identity-based crytosystems and signature schemes. In: Advances in Cryptology-Crypto84, Lecture notes in computer science, vol. 196. Berlin: Springer; 1984. p. 47.
-
(1984)
Lecture notes in computer science
, vol.196
, pp. 47
-
-
Shamir, A.1
-
46
-
-
14844287958
-
The strange logic of random graphs
-
Springer, Berlin
-
Spencer J. The strange logic of random graphs. Algorithms and combinatorics vol. 22 (2000), Springer, Berlin
-
(2000)
Algorithms and combinatorics
, vol.22
-
-
Spencer, J.1
-
47
-
-
33846090258
-
Review of key management mechanisms in wireless sensor networks
-
Sun D.-M., and He B. Review of key management mechanisms in wireless sensor networks. Acta Automatica Sinica 32 6 (2006) 900-906
-
(2006)
Acta Automatica Sinica
, vol.32
, Issue.6
, pp. 900-906
-
-
Sun, D.-M.1
He, B.2
-
49
-
-
33749659889
-
Energy analysis of public-key cryptography on small wireless devices
-
March
-
Wander A, Gura N, Eberle H, Gupta V, Shantz S. Energy analysis of public-key cryptography on small wireless devices. IEEE PerCom, March 2005.
-
(2005)
IEEE PerCom
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
50
-
-
14844304757
-
Tinypk: securing sensor networks with public key technology
-
ACM Press, New York, NY, USA
-
Watro R., Kong D., Cuti S., Gardiner C., Lynn C., and Kruus P. Tinypk: securing sensor networks with public key technology. Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (SASN 04) (2004), ACM Press, New York, NY, USA 59-64
-
(2004)
Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (SASN 04)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
52
-
-
51349098629
-
Identity-based key agreement and encryption for wireless sensor networks
-
Yang G., Rong C., Veigner C., Wang J., and Cheng H. Identity-based key agreement and encryption for wireless sensor networks. IJCSNS International Journal of Computer Science and Network Security 6 5B (2006) 182-189
-
(2006)
IJCSNS International Journal of Computer Science and Network Security
, vol.6
, Issue.5 B
, pp. 182-189
-
-
Yang, G.1
Rong, C.2
Veigner, C.3
Wang, J.4
Cheng, H.5
|