-
1
-
-
84983089516
-
The security of cipher block chaining
-
London, UK: Springer-Verlag
-
M. Bellare, J. Kilian, and P. Rogaway, "The security of cipher block chaining," in CRYPTO '94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1994, pp. 341-358.
-
(1994)
CRYPTO '94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
2
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
New York, NY, USA: ACM
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "Spins: security protocols for sensor networks," in MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2001, pp. 189-199.
-
(2001)
MobiCom '01: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
35048891868
-
Keying hash functions for message authentication
-
London, UK: Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1996, pp. 1-15.
-
(1996)
CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
3543056512
-
An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks," in IEEE Symposium on Security and Privacy, 2004, pp. 259-271.
-
IEEE Symposium on Security and Privacy, 2004
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
7
-
-
84943529186
-
Lhap: A lightweight hop-by-hop authentication protocol for ad-hoc networks
-
vol. 0
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Lhap: A lightweight hop-by-hop authentication protocol for ad-hoc networks," Distributed Computing Systems Workshops, International Conference on, vol. 0, p. 749, 2003.
-
(2003)
Distributed Computing Systems Workshops, International Conference on
, pp. 749
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
8
-
-
77955022289
-
Heap: Hop-by-hop efficient authentication protocol for mobile ad-hoc networks
-
San Diego, CA, USA: Society for Computer Simulation International
-
R. Akbani, T. Korkmaz, and G. V. S. Raju, "Heap: hop-by-hop efficient authentication protocol for mobile ad-hoc networks," in SpringSim '07: Proceedings of the 2007 spring simulaiton multiconference. San Diego, CA, USA: Society for Computer Simulation International, 2007, pp. 157-165.
-
(2007)
SpringSim '07: Proceedings of the 2007 Spring Simulaiton Multiconference
, pp. 157-165
-
-
Akbani, R.1
Korkmaz, T.2
Raju, G.V.S.3
-
9
-
-
70350755765
-
Alpha: An adaptive and lightweight protocol for hop-by-hop authentication
-
NewYork, NY, USA: ACM
-
T. Heer, S. Götz, O. G. Morchon, and K. Wehrle, "Alpha: an adaptive and lightweight protocol for hop-by-hop authentication," in CONEXT '08: Proceedings of the 2008 ACM CoNEXT Conference. NewYork, NY, USA: ACM, 2008, pp. 1-12.
-
(2008)
CONEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
, pp. 1-12
-
-
Heer, T.1
Götz, S.2
Morchon, O.G.3
Wehrle, K.4
-
10
-
-
45849100533
-
Broadcast authentication in sensor networks using compressed bloom filters
-
Y.-S. Chen, I.-L. Lin, C.-L. Lei, and Y.-H. Liao, "Broadcast authentication in sensor networks using compressed bloom filters," in DCOSS, 2008, pp. 99-111.
-
DCOSS, 2008
, pp. 99-111
-
-
Chen, Y.-S.1
Lin, I.-L.2
Lei, C.-L.3
Liao, Y.-H.4
-
11
-
-
56749151138
-
Pre-authentication filters: Providing dos resistance for signature-based broadcast authentication in sensor networks
-
New York, NY, USA: ACM
-
Q. Dong, D. Liu, and P. Ning, "Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks," in WiSec '08: Proceedings of the first ACM conference on Wireless network security. New York, NY, USA: ACM, 2008, pp. 2-12.
-
(2008)
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security
, pp. 2-12
-
-
Dong, Q.1
Liu, D.2
Ning, P.3
|