-
1
-
-
0036688074
-
A survey on sensor networks
-
Lan F A, Su W, Yogesh S. A survey on sensor networks. IEEE Communications Magazine, 2002, 40(8): 102-114
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Lan, F.A.1
Su, W.2
Yogesh, S.3
-
2
-
-
31844454281
-
Energy-Efficient and Scalable Group Key Agreement for Large Ad Hoc Networks PE-WASUN'05
-
Joseph Chee Ming Teo, Chik How Tan. Energy-Efficient and Scalable Group Key Agreement for Large Ad Hoc Networks. PE-WASUN'05, 2005, 114-121
-
(2005)
, pp. 114-121
-
-
Teo, J.C.M.1
Tan, C.H.2
-
4
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
New York: IEEE publishing
-
Chan H, et al. Random key predistribution schemes for sensor networks. IEEE symposium on Research in Security and Privacy, New York: IEEE publishing, 2003, 197-213
-
(2003)
IEEE symposium on Research in Security and Privacy
, pp. 197-213
-
-
Chan, H.1
-
7
-
-
70350548888
-
Reduce radio energy consumption of key management protocol for wireless sensor networks ISLPED'04
-
Newport Beach, California, US. ACM Press
-
Cheng B, Sungha D. Reduce radio energy consumption of key management protocol for wireless sensor networks. ISLPED'04, Newport Beach, California, US. ACM Press, 2004
-
(2004)
-
-
Cheng, B.1
Sungha, D.2
-
9
-
-
1542286901
-
Fast authenticated key establishment protocols for self-organizing sensor networks ACM WSNA 03
-
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J. Fast authenticated key establishment protocols for self-organizing sensor networks. In: ACM WSNA 03, 2003, 141-150
-
(2003)
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
10
-
-
24144458508
-
A New Two-Party Identity-Based Authenticated Key Agreement CT-RSA'05
-
N.McCullagh and P.S.L.M.Barreto, A New Two-Party Identity-Based Authenticated Key Agreement. CT-RSA'05, 2005,3376:262-274
-
(2005)
, vol.3376
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
11
-
-
24944483778
-
Securing sensor networks with location-based keys WCNC'05
-
Zhang, Y., Liu, W., Lou, W., Fang, Y. Securing sensor networks with location-based keys. WCNC'05, 2005,1909-1914
-
(2005)
, pp. 1909-1914
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
12
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
Zhang, Y., Liu, W., Lou, W., Fang, Y. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks. 2006, 24(2):247-260
-
(2006)
IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
13
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
Zhang, Y., Liu, W., Lou, W., Fang, Y. Secure localization and authentication in ultra-wideband sensor networks. IEEE JSAC, Special Issue on UWB Wireless Communications Theory and Applications. 2006,24(2):829-835
-
(2006)
IEEE JSAC, Special Issue on UWB Wireless Communications Theory and Applications
, vol.24
, Issue.2
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
14
-
-
38049019206
-
Key Establishment Scheme for Sensor Networks with Low Communication Cost ATC2007
-
Y.H.Kim, H.Lee, et al. Key Establishment Scheme for Sensor Networks with Low Communication Cost. ATC2007, 2007, 441-448.
-
(2007)
, pp. 441-448
-
-
Kim, Y.H.1
Lee, H.2
-
15
-
-
78651591648
-
An ID-Based Key Agreement Protocol for Wireless Sensor Networks ICISE 2009
-
Zhang Liping, Wang Yi. An ID-Based Key Agreement Protocol for Wireless Sensor Networks. ICISE2009,2009
-
(2009)
-
-
Liping, Z.1
Yi, W.2
-
16
-
-
19644371756
-
Attacks on Bresson-Chevassut- Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
-
J. Nam, S.Kim, D. Won. Attacks on Bresson-Chevassut- Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices. Proc. of IEEE Communications Letters, 2005
-
(2005)
Proc. of IEEE Communications Letters
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
17
-
-
26444474509
-
ID-based Authenticated Key Agreement for Low-Power Mobile Devices ACISP 05
-
Choi, K.Y., Hwang, J.Y., Lee, D.H. ID-based Authenticated Key Agreement for Low-Power Mobile Devices. ACISP 05. 2005, 494-505.
-
(2005)
, pp. 494-505
-
-
Choi, K.Y.1
Hwang, J.Y.2
Lee, D.H.3
-
18
-
-
33644748254
-
Provably secure authenticated key exchange protocols for low power computing clients
-
Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang. Provably secure authenticated key exchange protocols for low power computing clients. Computers and Security, 2006, 25(2):106-113.
-
(2006)
Computers and Security
, vol.25
, Issue.2
, pp. 106-113
-
-
Wen, H.A.1
Lin, C.L.2
Hwang, T.3
-
19
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Springer-Verlag, Berlin Proceedings of PKC'05, LNCS 3386
-
M. Abdalla, P. A. Fouque, D. Pointcheval. Password-based authenticated key exchange in the three-party setting. In proceedings of PKC'05, LNCS 3386, Springer-Verlag, Berlin, 2005, 65-84.
-
(2005)
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.A.2
Pointcheval, D.3
-
20
-
-
55749109090
-
A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms
-
Yang Geng, Wang Jiang-tao, Cheng Hong-bing, Rong Chun-ming. A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms. Acta electronica Sinica, 2007, 35(1):180-184.
-
(2007)
Acta electronica Sinica
, vol.35
, Issue.1
, pp. 180-184
-
-
Geng, Y.1
Jiang-tao, W.2
Hong-bing, C.3
Chun-ming, R.4
|