-
1
-
-
30344482882
-
INSENS: Intrusion-tolerant routing for wireless sensor networks
-
Jing Deng, Richard Han, Shivakant Mishra, "INSENS: Intrusion-tolerant routing for wireless sensor networks", Computer Communications,29(2), pp.216-230, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
2
-
-
62949194452
-
A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
-
Xiaojiang Du, Mohsen Guizani, Yang Xiao,Usiao-Hwa Chen, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks", IEEE Transactions on wireless communications,VOL.8, NO.3, pp.1223-1229, 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1223-1229
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, U.-H.4
-
3
-
-
25844505160
-
Exploiting Heterogeneity in Sensor Networks
-
Mar.
-
M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh, "Exploiting Heterogeneity in Sensor Networks," in Proc. of IEEE INFOCOM'05, pp.878-890, Mar. 2005.
-
(2005)
Proc. of IEEE INFOCOM'05
, pp. 878-890
-
-
Yarvis, M.1
Kushalnagar, N.2
Singh, H.3
Rangarajan, A.4
Liu, Y.5
Singh, S.6
-
4
-
-
0038341106
-
A key management scheme for distributed sensor networks
-
Nov.
-
Eschenauer L, Gligor V., "A key management scheme for distributed sensor networks," In:Proc.of the 9th ACM Conf. on Computer and Communications Security, Washington D.C., pp.41-47, Nov. 2002.
-
(2002)
Proc.of the 9th ACM Conf. on Computer and Communications Security, Washington D.C.
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
5
-
-
0038487088
-
Random Key predistribution schemes for sensor networks
-
May 11-14
-
Haowen Chan, Perrig A. and Song D., "Random Key predistribution schemes for sensor networks," In IEEE Symposium on Security and privacy, Berkeley, California, pp.197-213, May 11-14, 2003.
-
(2003)
IEEE Symposium on Security and Privacy, Berkeley, California
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D.Liu, P.Ning., "Establishing pairwise keys in distributed sensor networks," In proceedings of the 10th ACM Conference on Computer and Communications Security(CCS), Washington DC., October 27-31, 2003, pp.52-61.
-
Proceedings of the 10th ACM Conference on Computer and Communications Security(CCS), Washington DC., October 27-31, 2003
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
7
-
-
8344262333
-
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge
-
March 7-11, (INFOCOM 2004)
-
Wenliang Du, Jing Deng, Yunghsiang S.han, Shigang Chen, Pramod K. Varshney. , "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp.586-597 , March 7-11, 2004(INFOCOM 2004).
-
(2004)
Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.1
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Shan, Y.3
Chen, S.4
Varshney, P.K.5
-
8
-
-
10044284351
-
LEAP:Efficient security mechanisms for large-scale distributed sensor networks
-
October
-
Zhu S, Setia S, Jajodia S., "LEAP:Efficient security mechanisms for large-scale distributed sensor networks", In Proc. Of the 10th ACM Conf. on Computer and Communications Security, Washington D.C., pp.62-72, October 2003.
-
(2003)
Proc. Of the 10th ACM Conf. on Computer and Communications Security, Washington D.C.
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
9
-
-
33646921841
-
Loaction-aware combinatorial key management scheme for clustered sensor networks
-
Aug.
-
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy, "Loaction-aware combinatorial key management scheme for clustered sensor networks," In IEEE Trans. On Parallel and Distributed System, vol. 17, NO.8, pp.865-882, Aug. 2006.
-
(2006)
IEEE Trans. On Parallel and Distributed System
, vol.17
, Issue.8
, pp. 865-882
-
-
Younis, M.F.1
Ghumman, K.2
Eltoweissy, M.3
-
10
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sep.
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar J D. , "SPINS: Security protocols for sensor networks," ACM Wireless Networks, vol. 8, No. 5, pp. 521-534, Sep. 2002.
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
11
-
-
33144476837
-
Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
-
Zhang Yanchao, Liu Wei, Lou Wenjing, et al., "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks" ,IEEE Journal on Selected Areas in Commnuications, 24( 2) , 247-260, 2006.
-
(2006)
IEEE Journal on Selected Areas in Commnuications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
12
-
-
14844304757
-
Tinypk: Securing Sensor Networks with Public Key Technology
-
USA:ACM Press
-
Watro Ronald, Kong Derrick, Cuti Sue-fen, et al., "Tinypk: Securing Sensor Networks with Public Key Technology", Workshop on Security of ad hoc and Sensor Networks Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, Washington DC, pp.59-64,USA:ACM Press,2004.
-
(2004)
Workshop on Security of Ad Hoc and Sensor Networks Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.-F.3
-
13
-
-
0018545449
-
How to share a secret a secret
-
Nov.
-
A.Shamir, "How to share a secret a secret", Communications of the ACM, vol. 22, No.11, pp.612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
34347240364
-
Key management schemes and protocols for wireless sensor networks
-
May
-
Su Zhong, Lin Chuang, Feng Fu-jun, Ren Feng-yuan, "Key management schemes and protocols for wireless sensor networks," Journal of Software, vol.18, No.5, pp.1218-1231, May 2007.
-
(2007)
Journal of Software
, vol.18
, Issue.5
, pp. 1218-1231
-
-
Su, Z.1
Lin, C.2
Feng, F.-J.3
Ren, F.-Y.4
|