-
1
-
-
84874324906
-
Identity-based encryption from the weil pairing [c]
-
CRYPTO 2001, Lecture Notes in Computer Science
-
Dan Boneh, Matt Franklin. Identity-based encryption from the Weil pairing [C]. Advances in Cryp tology, CRYPTO 2001, Lecture Notes in Computer Science, 2001, 2139: 213-229.
-
(2001)
Advances in Cryp Tology
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
34548618380
-
A novel encryption scheme for wireless sensor networks based on identity-based encryption
-
Yang Geng, Yu Xiaojie, Wang Jiangtao, Cheng Hongbing. A Novel Encryption Scheme for Wireless Sensor Networks based on Identity-Based Encryption. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27(4): 1-8.
-
(2007)
Journal of Nanjing University of Posts and Telecommunications (Natural Science)
, vol.27
, Issue.4
, pp. 1-8
-
-
Geng, Y.1
Xiaojie, Y.2
Jiangtao, W.3
Hongbing, C.4
-
3
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and CommunicationsSecurity. New York: ACM Press, 2003. 62-72. (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
4
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Perrig A, Szewczyk R, Tygar J, Wen V, Culler D. SPINS: Security protocols for sensor networks. ACM Wireless Network, 2002, 8(5):521-534.
-
(2002)
ACM Wireless Network
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
5
-
-
33646921841
-
Location-aware combinatorial key management scheme for clustered sensor networks
-
Younis M, Ghumman K, Eltoweissy M. Location-Aware combinatorial key management scheme for clustered sensor networks. IEEE Trans, on Parallel and Distribution System, 2006, 17(8):865-882.
-
(2006)
IEEE Trans on Parallel and Distribution System
, vol.17
, Issue.8
, pp. 865-882
-
-
Younis, M.1
Ghumman, K.2
Eltoweissy, M.3
-
6
-
-
33646918277
-
Dynamic key management in sensor networks
-
Eltoweissy M, Moharrum M, Mukkamala R. Dynamic key management in sensor networks. IEEE Communications Magazine,2006, 44(4):122-130.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 122-130
-
-
Eltoweissy, M.1
Moharrum, M.2
Mukkamala, R.3
-
7
-
-
34347240364
-
Key management schemes and protocols for wireless sensor networks
-
Su Zhong, Lin Chuang, Feng Fu-Jun, REN Feng-Yuan. Key Management Schemes and Protocols for Wireless Sensor Networks. Journal of Software,2007, 18(5):1218-1231.
-
(2007)
Journal of Software
, vol.18
, Issue.5
, pp. 1218-1231
-
-
Zhong, S.1
Chuang, L.2
Feng, F.-J.3
Ren, F.-Y.4
-
8
-
-
48549088586
-
Trust management in wireless sensor networks
-
JING Qi, TANG Li-Yong, CHEN Zhong. Trust Management in Wireless Sensor Networks. Journal of Software, 2008, 19(7): 1716-1730.
-
(2008)
Journal of Software
, vol.19
, Issue.7
, pp. 1716-1730
-
-
Jing, Q.1
Tang, L.-Y.2
Chen, Z.3
-
10
-
-
1542286901
-
Fast authenticated key establishment protocols for self-organizing sensor networks
-
New York: ACM Press
-
Huang Q, Cukier J, Kobayashi H, Liu B, Zhang J. Fast authenticated key establishment protocols for self-organizing sensor networks. In: Proc. of the 2nd ACM Int 1 Conf. on Wireless Sensor Networks and Applications. New York: ACM Press, 2003.141-150.
-
(2003)
Proc. of the 2nd ACM Int 1 Conf. on Wireless Sensor Networks and Applications
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
|