-
1
-
-
84947616705
-
-
Crossbow Technology Inc. Wireless sensor networks.
-
Crossbow Technology Inc. Wireless sensor networks.
-
-
-
-
2
-
-
0037086890
-
Wireless sensor networks: a survey
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Computer Networks 2002; 38 (4): 393-422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
79251554556
-
-
AES proposal: Rijndael. In AES Round 1 Technical Evaluation, CD-1: Documentation NIST, August
-
Daemen J, Rijmen V. AES proposal: Rijndael. In AES Round 1 Technical Evaluation, CD-1: Documentation NIST, August 1998.
-
(1998)
-
-
Daemen, J.1
Rijmen, V.2
-
4
-
-
79251540439
-
-
Cryptography and Network Security: Principles and Practices (3rd edn). Pearson Education India.
-
Stallings W. Cryptography and Network Security: Principles and Practices (3rd edn). Pearson Education India, 2003.
-
(2003)
-
-
Stallings, W.1
-
5
-
-
0001826463
-
The RC5 encryption algorithm
-
Rivest RL. The RC5 encryption algorithm. Dr. Dobb's Journal 1995; 20 (1): 146-148.
-
(1995)
Dr. Dobb's Journal
, vol.20
, Issue.1
, pp. 146-148
-
-
Rivest, R.L.1
-
6
-
-
0038487088
-
-
Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy Berkeley, California, -
-
Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy Berkeley, California, 2003; 197-213.
-
(2003)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
33847120377
-
LEAP+: efficient security mechanisms for large-scale distributed sensor networks
-
Zhu S, Setia S, Jajodia S. LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2006; 2 (4): 500-528.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
8
-
-
33750351971
-
-
A key management scheme for large scale distributed sensor networks. In Proceedings of the IFIP TC6 11th International Conference PWC 2006, Lecture Notes in Computer Science, Springer-Verlag, Albacete, Spain, 20-22 September.
-
Kim YH, Lee H, Lee DH, Lim J. A key management scheme for large scale distributed sensor networks. In Proceedings of the IFIP TC6 11th International Conference PWC 2006, Lecture Notes in Computer Science, vol. 4217, Springer-Verlag, Albacete, Spain, 20-22 September 2006; 437-446.
-
(2006)
, vol.4217
, pp. 437-446
-
-
Kim, Y.H.1
Lee, H.2
Lee, D.H.3
Lim, J.4
-
9
-
-
84884730529
-
-
An optimal class of symmetric key generation systems. In Proceeding of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques Lecture Notes in Computer Science, Paris, France, Springer-Verlag.
-
Blom R. An optimal class of symmetric key generation systems. In Proceeding of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques Lecture Notes in Computer Science, vol. 209, Paris, France, Springer-Verlag, 1985; 335-338.
-
(1985)
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
10
-
-
84989455644
-
-
On the key predistribution system: a practical solution to the key distribution problem. In Proceedings of the CRYPTO 1987, Lecture Notes in Computer Science, Springer-Verlag.
-
Matsumoto T, Imai H. On the key predistribution system: a practical solution to the key distribution problem. In Proceedings of the CRYPTO 1987, Lecture Notes in Computer Science, vol. 293, Springer-Verlag, 1987; 185-193.
-
(1987)
, vol.293
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
11
-
-
0025212474
-
A matrix key-distribution scheme
-
Gong L, Wheeler DJ. A matrix key-distribution scheme. Journal of Cryptology 1990; 2 (1): 51-59.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.1
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
13
-
-
0029362456
-
On key storage in secure networks
-
Dyer M, Fenner T, Frieze A, Thomason A. On key storage in secure networks. Journal of Cryptology 1995; 8 (4): 189-200.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.4
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomason, A.4
-
14
-
-
0038341106
-
-
A key management scheme for distributed sensor networks. In The 9th ACM Conference on Computer and Communication Security November.
-
Eschenauer L, Gligor VD. A key management scheme for distributed sensor networks. In The 9th ACM Conference on Computer and Communication Security November 2002; 41-47.
-
(2002)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
15
-
-
33745289967
-
-
Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks. In International Workshop on Distributed Computing (IWDC 2005), LNCS 3741.
-
Das AK, Das A, Mohapatra S, Vavilapalli S. Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks. In International Workshop on Distributed Computing (IWDC 2005), LNCS 3741 2005; 404-409.
-
(2005)
, pp. 404-409
-
-
Das, A.K.1
Das, A.2
Mohapatra, S.3
Vavilapalli, S.4
-
17
-
-
8344262333
-
-
A key management scheme for wireless sensor networks using deployment knowledge. In 23rd Conference of the IEEE Communications Society (Infocom'04) Hong Kong, China, 21-25 March.
-
Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In 23rd Conference of the IEEE Communications Society (Infocom'04) Hong Kong, China, 21-25 March 2004; 586-597.
-
(2004)
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
18
-
-
4544301464
-
-
Di, Random key-assignment for secure wireless sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks October.
-
Di Pietro R, Mancini LV, Mei A. Random key-assignment for secure wireless sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks October 2003; 62-71.
-
(2003)
, pp. 62-71
-
-
Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
19
-
-
0842289248
-
-
Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks. In IEEE Global Telecommunications Conference, 2003 (GLOBECOM 03).
-
Ramkumar M, Memon N, Simha R. Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks. In IEEE Global Telecommunications Conference, 2003 (GLOBECOM 03) vol. 3, 2003; 1405-1409.
-
(2003)
, vol.3
, pp. 1405-1409
-
-
Ramkumar, M.1
Memon, N.2
Simha, R.3
-
21
-
-
46749158359
-
An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
-
Das AK. An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks. International Journal of Network Security (IJNS), 2008; 6 (2): 134-144.
-
(2008)
International Journal of Network Security (IJNS)
, vol.6
, Issue.2
, pp. 134-144
-
-
Das, A.K.1
-
23
-
-
31844436263
-
-
A study of static versus dynamic keying schemes in sensor networks. In ACM Workshop on performance evaluation of Wireless Ad-hoc, Sensor and Ubiquitous Networks (PE-WASUN 2005) Montreal, Candas, October.
-
Moharrum M, Eltoweissy M. A study of static versus dynamic keying schemes in sensor networks. In ACM Workshop on performance evaluation of Wireless Ad-hoc, Sensor and Ubiquitous Networks (PE-WASUN 2005) Montreal, Candas, October 2005; 122-129.
-
(2005)
, pp. 122-129
-
-
Moharrum, M.1
Eltoweissy, M.2
-
24
-
-
84866860550
-
Improving key pre-distribution with deployment knowledge in static sensor networks
-
Liu D, Ning P. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 2005; 1 (2): 204-239.
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, Issue.2
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
25
-
-
33749033368
-
-
Group-based key pre-distribution in wireless sensor networks. In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005) September
-
Liu D, Ning P, Du W. Group-based key pre-distribution in wireless sensor networks. In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005) September 2005.
-
(2005)
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
26
-
-
3042822764
-
-
Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS) Washington DC, 27--31 October.
-
Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS) Washington DC, 27--31 October 2003; 52-61.
-
(2003)
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
27
-
-
28444454523
-
-
SECK: Survivable and efficient clustered keying for wireless sensor networks. In IEEE Workshop on Information Assurance in Wireless Sensor Networks, WSNIA005 April.
-
Chorzempa M, Park JM, Eltoweissy M. SECK: Survivable and efficient clustered keying for wireless sensor networks. In IEEE Workshop on Information Assurance in Wireless Sensor Networks, WSNIA005 April 2005; 453-458.
-
(2005)
, pp. 453-458
-
-
Chorzempa, M.1
Park, J.M.2
Eltoweissy, M.3
-
28
-
-
3543105535
-
Combinatorial optimizations of group key management
-
Eltoweissy M, Heydari H, Morales L, Sudborough H. Combinatorial optimizations of group key management. Journal of Networks and Systems Management 2004; 12 (1): 30-50.
-
(2004)
Journal of Networks and Systems Management
, vol.12
, Issue.1
, pp. 30-50
-
-
Eltoweissy, M.1
Heydari, H.2
Morales, L.3
Sudborough, H.4
-
29
-
-
0017959977
-
Secure communication over insecure channels
-
Merkle R. Secure communication over insecure channels. Communications of the ACM 1978; 21 (4): 294-299.
-
(1978)
Communications of the ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.1
-
31
-
-
79251558967
-
-
Secure hash standard. FIPS PUB 180-1 National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April
-
Secure hash standard. FIPS PUB 180-1 National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995.
-
(1995)
-
-
|