-
1
-
-
33750419991
-
Randomness in Self-healing Key Distribution Schemes
-
Blundo, C.: Randomness in Self-healing Key Distribution Schemes. In: Proc. IEEE Information Theory Workshop, pp. 80-84 (2005)
-
(2005)
Proc. IEEE Information Theory Workshop
, pp. 80-84
-
-
Blundo, C.1
-
3
-
-
84939166906
-
A Flaw in A Self-healing Key Distribution Schemes
-
Blundo, C., D'Arco, P., Listo, M.: A Flaw in A Self-healing Key Distribution Schemes. In: Proc. Information Theory Workshop, pp. 163-166 (2003)
-
(2003)
Proc. Information Theory Workshop
, pp. 163-166
-
-
Blundo, C.1
D'Arco, P.2
Listo, M.3
-
4
-
-
33646153894
-
Definitions and Bounds for Selfhealing Key Distribution
-
Díaz, J, Karhumäki, J, Lepistö, A, Sannella, D, eds, ICALP 2004, Springer, Heidelberg
-
Blundo, C., D'Arco, P., Santis, A., Listo, M.: Definitions and Bounds for Selfhealing Key Distribution. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol. 3142, pp. 234-245. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3142
, pp. 234-245
-
-
Blundo, C.1
D'Arco, P.2
Santis, A.3
Listo, M.4
-
5
-
-
3543067539
-
Design of Self-healing Key Distribution Schemes
-
Blundo, C., D'Arco, P., Santis, A., Listo, M.: Design of Self-healing Key Distribution Schemes. Designs, Codes and Cryptography 32(1-3), 15-44 (2004)
-
(2004)
Designs, Codes and Cryptography
, vol.32
, Issue.1-3
, pp. 15-44
-
-
Blundo, C.1
D'Arco, P.2
Santis, A.3
Listo, M.4
-
6
-
-
85028765277
-
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, 740, pp. 471-486. Springer, Heidelberg (1993)
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471-486. Springer, Heidelberg (1993)
-
-
-
-
7
-
-
0038487088
-
Random Key Pre-distribution Schemes for Sensor Networks
-
Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197-213 (2003)
-
(2003)
Proc. IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
3042783638
-
-
Du, W.L., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. ACM Conference on Computer and Communication Security, CCS 2003, pp. 42-51 (2003)
-
Du, W.L., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. ACM Conference on Computer and Communication Security, CCS 2003, pp. 42-51 (2003)
-
-
-
-
9
-
-
38049016463
-
-
Dutta, R., Change, E.C., Mukhopadhyay, S.: Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 385-400. Springer, Heidelberg (2007)
-
Dutta, R., Change, E.C., Mukhopadhyay, S.: Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385-400. Springer, Heidelberg (2007)
-
-
-
-
10
-
-
57049132118
-
-
Du,W., He,M.: Self-healingKeyDistribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, 5324, pp. 345-359. Springer, Heidelberg (2008)
-
Du,W., He,M.: Self-healingKeyDistribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 345-359. Springer, Heidelberg (2008)
-
-
-
-
11
-
-
0033892676
-
Performance Comparison of Two On-demand Routing Procotols for Ad Hoc Networks
-
IEEE Press, Los Alamitos
-
Das, S., Perkins, C., Royer, E.: Performance Comparison of Two On-demand Routing Procotols for Ad Hoc Networks. In: Proc. of IEEE INFOCOM 2000, vol. 1, pp. 3-12. IEEE Press, Los Alamitos (2000)
-
(2000)
Proc. of IEEE INFOCOM
, vol.1
, pp. 3-12
-
-
Das, S.1
Perkins, C.2
Royer, E.3
-
14
-
-
27644512043
-
An Efficient Key Distribution Scheme with Self-healing Property
-
Hong, D., Kang, J.: An Efficient Key Distribution Scheme with Self-healing Property. IEEE Communication Letters 9, 759-761 (2005)
-
(2005)
IEEE Communication Letters
, vol.9
, pp. 759-761
-
-
Hong, D.1
Kang, J.2
-
15
-
-
14844314204
-
Location-aware Key Management Scheme for Wireless Sensor Networks
-
Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware Key Management Scheme for Wireless Sensor Networks. In: Proc. 2nd ACM workshop on Security of Ad Hoc and Sensor Networks
-
Proc. 2nd ACM workshop on Security of Ad Hoc and Sensor Networks
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
16
-
-
76549134710
-
-
http://www.intel.com/research/exploratory/heterogeneous.htm
-
-
-
-
17
-
-
84969513597
-
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
-
Hawaii International Conference on System Sciences, HICSS 2003 2003
-
Kachirski, O., Guha, R.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: Proc. 36th Annual Hawaii International Conference on System Sciences, HICSS 2003 (2003)
-
Proc. 36th Annual
-
-
Kachirski, O.1
Guha, R.2
-
19
-
-
84866860550
-
Improving Key Pre-distribution wih Deployment Knowledge in Static Sensor Networks
-
Liu, D., Ning, P.: Improving Key Pre-distribution wih Deployment Knowledge in Static Sensor Networks. ACM Transactions on Sensor Networks (2005)
-
(2005)
ACM Transactions on Sensor Networks
-
-
Liu, D.1
Ning, P.2
-
22
-
-
39149119287
-
Collaborative Techniques for Intrusion Detection in Mobile Ad-hoc Networks
-
Marchang, N., Datta, R.: Collaborative Techniques for Intrusion Detection in Mobile Ad-hoc Networks. Ad Hoc Network 6, 508-523 (2008)
-
(2008)
Ad Hoc Network
, vol.6
, pp. 508-523
-
-
Marchang, N.1
Datta, R.2
-
23
-
-
84978428047
-
-
Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: Proc. 5th Annul Symposium on Operating Systems Design and Implementation, OSDI 2002 (2002)
-
Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: Proc. 5th Annul Symposium on Operating Systems Design and Implementation, OSDI 2002 (2002)
-
-
-
-
24
-
-
76549130083
-
-
http://www.xbow.com/Products/productdetails.aspx?sid=156
-
-
-
-
26
-
-
51749099404
-
Exploiting heterogeneity for sensor network security
-
Mache, J., Wan, C.Y., Yarvis, M.: Exploiting heterogeneity for sensor network security. In: Proc. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2008, pp. 591-593 (2008)
-
(2008)
Proc. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON
, pp. 591-593
-
-
Mache, J.1
Wan, C.Y.2
Yarvis, M.3
-
27
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
WINE
-
Perrig, A., Szewczyk, R.,Wen, V., Culler, D., Tygar, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, WINE (2002)
-
(2002)
Wireless Networks Journal
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
28
-
-
0036086453
-
Self-healing Key Distribution with Revocation
-
Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing Key Distribution with Revocation. In: Proc. IEEE Symposium on Security and Privacy, S&P 2002, pp. 241-257 (2002)
-
(2002)
Proc. IEEE Symposium on Security and Privacy, S&P
, pp. 241-257
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
29
-
-
25844505160
-
Exploiting Heterogeneity in Sensor Networks
-
Yarvis, M., et al.: Exploiting Heterogeneity in Sensor Networks. In: Proc. IEEE INFOCOM 2005 (2005)
-
(2005)
Proc. IEEE INFOCOM 2005
-
-
Yarvis, M.1
-
30
-
-
76549104628
-
Hierarchical Self-Healing Key Distribution for Heterogeneous Wireless Sensor Networks
-
Yang, Y.J., Zhou, J.Y., Deng, R.H., Bao, F.: Hierarchical Self-Healing Key Distribution for Heterogeneous Wireless Sensor Networks. In: Proc. Securecomm 2009 (2009), http://icsd.i2r.a-star.edu.sg/staff/yanjiang/papers/ securecomm09.pdf
-
(2009)
Proc. Securecomm
-
-
Yang, Y.J.1
Zhou, J.Y.2
Deng, R.H.3
Bao, F.4
-
31
-
-
10044284351
-
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proc. ACM Conferenc on Computer and Communication Security, CCS 2003, pp. 62-72 (2003)
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proc. ACM Conferenc on Computer and Communication Security, CCS 2003, pp. 62-72 (2003)
-
-
-
|