-
3
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu S., Setia S., Jajodia S., LEAP: efficient security mechanisms for large-scale distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) October 2003 Washington, DC, USA 62 72
-
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) October 2003 Washington, DC, USA
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
4
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
DOI 10.1145/1218556.1218559
-
Zhu S., Setia S., Jajodia S., LEAP+: efficient security mechanisms for large-scale distributed se (Pubitemid 46278640)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
5
-
-
33847255502
-
A practical study of transitory master key establishment for wireless sensor networks
-
Deng J., Hartung C., Han R., Mishra S., A practical study of transitory master key establishment for wireless sensor networks Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm '05) September 2005 Athens, Greece 289 299
-
Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm '05) September 2005 Athens, Greece
, pp. 289-299
-
-
Deng, J.1
Hartung, C.2
Han, R.3
Mishra, S.4
-
6
-
-
33750012404
-
Access control in wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
-
Zhou Y., Zhang Y., Fang Y., Access control in wireless sensor networks Ad Hoc Networks 2007 5 1 3 13 (Pubitemid 44573007)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
-
7
-
-
84943243577
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
Di Pietro R., Mancini L. V., Law Y. W., Etalle S., Havinga P., LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks Proceedings of the International Conference on Parallel Processing October 2003 Los Alamitos, Calif, USA 397 406
-
Proceedings of the International Conference on Parallel Processing October 2003 Los Alamitos, Calif, USA
, pp. 397-406
-
-
Di Pietro, R.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.5
-
9
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Chan H., Perrig A., Song D., Random key predistribution schemes for sensor networks Proceedings of IEEE Symposium on Security And Privacy May 2003 Oakland, Calif, USA 197 213
-
Proceedings of IEEE Symposium on Security and Privacy May 2003 Oakland, Calif, USA
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
11
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
Du W., Deng J., Han Y. S., Varshney P. K., Katz J., Khalili A., A pairwise key predistribution scheme for wireless sensor networks ACM Transactions on Information and System Security 2005 8 2 228 258 (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
16
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-Bit CPUs
-
Gura N., Patel A., Wander A., Eberle H., Shantz S. C., Comparing elliptic curve cryptography and RSA on 8-Bit CPUs Proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems (CHES '04) August 2004 Cambridge, Mass, USA 119 132
-
Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '04) August 2004 Cambridge, Mass, USA
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
17
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Wandert A. S., Gura N., Eberle H., Gupta V., Shantz S. C., Energy analysis of public-key cryptography for wireless sensor networks Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom '05) March 2005 Kauai Island, Hawaii, USA 324 328
-
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom '05) March 2005 Kauai Island, Hawaii, USA
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
19
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
Du W., Wang R., Ning P., An efficient scheme for authenticating public keys in sensor networks Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '05) May 2005 Urbana-Champaign, Ill, USA 58 67
-
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '05) May 2005 Urbana-Champaign, Ill, USA
, pp. 58-67
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
20
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Zhang Y., Liu W., Lou W., Fang Y., Location-based compromise-tolerant security mechanisms for wireless sensor networks IEEE Journal on Selected Areas in Communications 2006 24 2 247 260 (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
21
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig A., Szewczyk R., Tygar J. D., Wen V., Culler D. E., SPINS: security protocols for sensor networks Wireless Networks 2002 8 5 521 534
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
22
-
-
77949846830
-
An energy-efficient dynamic key management scheme in wireless sensor networks
-
Zhang X., He J., Wei Q., An energy-efficient dynamic key management scheme in wireless sensor networks Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN '09) December 2009 Kaohsiung, Taiwan 238 242
-
Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN '09) December 2009 Kaohsiung, Taiwan
, pp. 238-242
-
-
Zhang, X.1
He, J.2
Wei, Q.3
-
26
-
-
84976770858
-
Responses to NISTs proposal
-
Vanstone S., Responses to NISTs proposal CACM 1992 35 7 50 52
-
(1992)
CACM
, vol.35
, Issue.7
, pp. 50-52
-
-
Vanstone, S.1
-
29
-
-
3142751481
-
On supporting distributed collaboration in sensor networks
-
Wang G., Zhang W., Cao G., La Porta T., On supporting distributed collaboration in sensor networks Proceedings of IEEE Military Communications Conference (MILCOM '03) October 2003 Boston, Mass, USA 752 757
-
Proceedings of IEEE Military Communications Conference (MILCOM '03) October 2003 Boston, Mass, USA
, pp. 752-757
-
-
Wang, G.1
Zhang, W.2
Cao, G.3
La Porta, T.4
|