-
1
-
-
37849028668
-
-
A random perturbation-based scheme for pairwise key establishment in sensor networks. In Proceedings of 8th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc '07), Montreal, Quebec, Canada, -
-
Zhang W, Tran M, Zhu S, Cao G. A random perturbation-based scheme for pairwise key establishment in sensor networks. In Proceedings of 8th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc '07), Montreal, Quebec, Canada, 2007; 90-99.
-
(2007)
, pp. 90-99
-
-
Zhang, W.1
Tran, M.2
Zhu, S.3
Cao, G.4
-
2
-
-
0038341106
-
-
A key-management scheme for distributed sensor networks. In Proceedings of 9th ACM Conference on Computer and Communications Security (CSS '02), Washington, DC, U.S.A., -
-
Eschenauer L, Gligor V. A key-management scheme for distributed sensor networks. In Proceedings of 9th ACM Conference on Computer and Communications Security (CSS '02), Washington, DC, U.S.A., 2002; 41-47.
-
(2002)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
3
-
-
0038487088
-
-
Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P '03), -
-
Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P '03), 2003; 197-213.
-
(2003)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
67549091275
-
Efficient ID-based threshold random key pre-distribution scheme for wireless sensor networks
-
Dai TT, Hong CS. Efficient ID-based threshold random key pre-distribution scheme for wireless sensor networks. IEICE Transactions on Communications 2008; E91-B(8): 2602-2609.
-
(2008)
IEICE Transactions on Communications
, vol.91 E-B
, Issue.8
, pp. 2602-2609
-
-
Dai, T.T.1
Hong, C.S.2
-
6
-
-
23244467182
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security 2005; 8: 228-258.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
7
-
-
33750342024
-
-
A collusion attack on pairwise key predistribution schemes for distributed sensor networks. In Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '06), March.
-
Moore T. A collusion attack on pairwise key predistribution schemes for distributed sensor networks. In Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '06), March 2006; 13-17.
-
(2006)
, pp. 13-17
-
-
Moore, T.1
-
8
-
-
0037615371
-
The Strange Logic of Random Graphs
-
Berlin: Springer-Verlag.
-
Spencer J. The Strange Logic of Random Graphs, Vol. 22. Berlin: Springer-Verlag: 2001.
-
(2001)
, vol.22
-
-
Spencer, J.1
-
9
-
-
79251584221
-
-
C.T. Inc. Wireless Sensor Networks Product Reference Guide.
-
C.T. Inc. Wireless Sensor Networks Product Reference Guide, 2007.
-
(2007)
-
-
-
10
-
-
17744386714
-
-
Key infection: smart trust for smart dust. In Proceedings of 12th IEEE International Conference on Network Protocols (ICNP '04), -
-
Anderson R, Chan H, Perrig A. Key infection: smart trust for smart dust. In Proceedings of 12th IEEE International Conference on Network Protocols (ICNP '04), 2004; 206-215.
-
(2004)
, pp. 206-215
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
11
-
-
33847120377
-
LEAP+: efficient security mechanisms for large-scale distributed sensor networks
-
Zhu S, Setia S, Jajodia S. LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2006; 2: 500-528.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
12
-
-
25844473466
-
-
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In Proceedings of IEEE INFOCOM '05, -
-
Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In Proceedings of IEEE INFOCOM '05, 2005; 503-514.
-
(2005)
, pp. 503-514
-
-
Zhang, W.1
Cao, G.2
-
13
-
-
27544460282
-
-
Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P '05), -
-
Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P '05), 2005; 49-63.
-
(2005)
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
14
-
-
39049172951
-
Replication attack on random key pre-distribution schemes for wireless sensor networks
-
Fu H, Kawamura S, Zhang M, Zhang L. Replication attack on random key pre-distribution schemes for wireless sensor networks. Computer Communication 2008; 31: 842-857.
-
(2008)
Computer Communication
, vol.31
, pp. 842-857
-
-
Fu, H.1
Kawamura, S.2
Zhang, M.3
Zhang, L.4
-
15
-
-
84944878354
-
Handbook of Applied Cryptography
-
CRC Press, Inc. Boca Raton, FL.
-
Menezes A, Van-Oorschot P, Vanstone S. Handbook of Applied Cryptography. CRC Press, Inc. Boca Raton, FL: 1996.
-
(1996)
-
-
Menezes, A.1
Van-Oorschot, P.2
Vanstone, S.3
-
16
-
-
0031624874
-
-
Perfectly one-way probablistic hash functions. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98), 23-26 May.
-
Canetti R, Micciancio D, Reingold O. Perfectly one-way probablistic hash functions. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98), 23-26 May 1998; 131-140.
-
(1998)
, pp. 131-140
-
-
Canetti, R.1
Micciancio, D.2
Reingold, O.3
-
17
-
-
27544515049
-
Internet Security: Cryptographic Principles, Algorithms, and Protocols
-
Wiley Hoboken, NJ.
-
Rhee MY. Internet Security: Cryptographic Principles, Algorithms, and Protocols. Wiley Hoboken, NJ: 2003.
-
(2003)
-
-
Rhee, M.Y.1
-
18
-
-
8344262333
-
-
A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM '04, -
-
Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM '04, 2004; 586-597.
-
(2004)
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
19
-
-
84866860550
-
Improving key predistribution with deployment knowledge in static sensor networks
-
Liu D, Ning P. Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 2005; 1: 204-239.
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
20
-
-
51349133693
-
-
RoK: a robust key pre-distribution protocol for multi-phase wireless sensor network. In Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (SecureComm '07), Nice, France, September.
-
Castelluccia C, Spognardi A. RoK: a robust key pre-distribution protocol for multi-phase wireless sensor network. In Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (SecureComm '07), Nice, France, September 2007; 351-360.
-
(2007)
, pp. 351-360
-
-
Castelluccia, C.1
Spognardi, A.2
-
22
-
-
0036738266
-
PINS: security protocols for sensor networks
-
Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. PINS: security protocols for sensor networks. Wireless Network 2002; 8: 521-534.
-
(2002)
Wireless Network
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
|