-
2
-
-
62849114245
-
An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks
-
Amar Rasheed and Rabi Mahapatra, "An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks," The 27th IEEE International Performance, Computing and Communication Conference, IPCCC '08. 7-9 Dec 2008, Page(s): 264-270
-
The 27th IEEE International Performance, Computing and Communication Conference, IPCCC '08. 7-9 Dec 2008
, pp. 264-270
-
-
Rasheed, A.1
Mahapatra, R.2
-
3
-
-
3042783638
-
A Pairwise Key Predistribution Scheme for Wireless Sensor Networks
-
Oct. 70
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," In Proc. of the 10th ACM Conference on Computer and Communications Security (CCS), pp. 77-82, Oct. 2003. [70]
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security (CCS)
, pp. 77-82
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
5
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptology: Proceedings of EUROCRYPT 84 (Thomas Beth, Norbert Cot, and Ingemar Ingemarsson, eds.), Springer-Verlag
-
R. Blom. "An optimal class of symmetric key generation systems." Advances in Cryptology: Proceedings of EUROCRYPT 84 (Thomas Beth, Norbert Cot, and Ingemar Ingemarsson, eds.), Lecture Notes in Computer Science, Springer-Verlag, 09:335-338,1985.
-
(1985)
Lecture Notes in Computer Science
, vol.9
, pp. 335-338
-
-
Blom, R.1
-
8
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & defenses
-
James Newsome, Elaine Shi, Dawn Song, Adrian Perrig, "The Sybil attack in sensor networks: analysis & defenses", Proceedings of the 3rd international symposium on Information processing in sensor networks, April 26-27, 2004, Berkeley, California, USA
-
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, April 26-27, 2004, Berkeley, California, USA
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
9
-
-
74949117804
-
An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network
-
Nguyen Thi Thanh Huyen, Eui-Nam Huh, "An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network", Proceedings of the 2nd international conference on Ub iquitous information management and communication, January 31-February 01, 2008, Suwon, Korea
-
Proceedings of the 2nd International Conference on Ub Iquitous Information Management and Communication, January 31-February 01, 2008, Suwon, Korea
-
-
Huyen, N.T.T.1
Huh, E.-N.2
-
11
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar, "SPINS: Security protocols for sensor networks," Wireless Networks, pp. 521-534, 2001.
-
(2001)
Wireless Networks
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
14
-
-
84866860550
-
Improving key predistribution with deployment knowledge in static sensor networks
-
D. Liu and P. Ning. "Improving key predistribution with deployment knowledge in static sensor networks". TOSN, 1(2):204. 239, 2005.
-
(2005)
TOSN
, vol.1
, Issue.2
-
-
Liu, D.1
Ning, P.2
-
17
-
-
62749133261
-
Accomplishment of the key setting up: The flexible approach
-
H.T.T. Nguyen, S. Na, G. Lee, and E. Huh. "Accomplishment of the key setting up: The flexible approach". The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing, July 2008, U.S.A.
-
The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing, July 2008, U.S.A.
-
-
Nguyen, H.T.T.1
Na, S.2
Lee, G.3
Huh, E.4
-
20
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
USA
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruss, "TinyPK: Securing sensor networks with public key technology", In Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, pp. 59-64, 2004, USA.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruss, P.6
-
21
-
-
38049003964
-
A Survey of Key Management in Ad Hoc Networks
-
3rd Quarter
-
A. M. Hegland, E. Winjum, S. F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, "A Survey of Key Management in Ad Hoc Networks". In IEEE Communications Surveys & Tutorials, 3rd Quarter, Vol. 8, No. 3, pp. 48-66, 2006.
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.3
, pp. 48-66
-
-
Hegland, A.M.1
Winjum, E.2
Mjolsnes, S.F.3
Rong, C.4
Kure, O.5
Spilling, P.6
-
22
-
-
56949088196
-
A Survey of Security Issues in Wireless Sensor Networks
-
2nd Quarter
-
Y. Wang, G. Atterbury, and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks," IEEE Communications Surveys and Tutorials, 2nd Quarter, Vol. 8, No. 2, pp. 2-23, 2006.
-
(2006)
IEEE Communications Surveys and Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Atterbury, G.2
Ramamurthy, B.3
|