-
1
-
-
70349659577
-
Dependable and secure sensor data storage with dynamic integrity assurance
-
Q. Wang, K. Ren, W. Lou, Y. Zhang, "Dependable and secure sensor data storage with dynamic integrity assurance", in: Proc. IEEE INFOCOM, 2009, pp. 954-962.
-
(2009)
Proc. IEEE INFOCOM
, pp. 954-962
-
-
Wang, Q.1
Ren, K.2
Lou, W.3
Zhang, Y.4
-
2
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, J.K. Katz, A. Khalili, A pairwise key predistribution scheme for wireless sensor networks, in: ACM Trans. Inform. System Security, vol. 8, no. 2, 2005, pp. 228-258. (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
3
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh, M. Franklin, "Identity-based encryption from the Weil pairing", in Proc. Crypto, 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
DOI 10.1109/TDSC.2006.58
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang Securing mobile ad hoc networks with certificateless public keys IEEE Trans. Dependable Secure Comput. 3 4 2006 386 399 (Pubitemid 44837040)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
5
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Trans. Mobile Comput. 5 2 2006 128 143 (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
6
-
-
33750008721
-
Self-healing group key distribution with time-limited node revocation for wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.007, PII S1570870506000448, Security Issues in Sensor and Ad Hoc Networks
-
Y. Jiang, C. Lin, M. Shi, and X. Shen Seal-healing group key distribution with time-limited user revocation for wireless sensor networks Ad Hoc Netw. Elsevier 5 1 2007 14 23 (Pubitemid 44573003)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 14-23
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
8
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proc. IEEE Symp. Security Privacy, 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symp. Security Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
9
-
-
12444300139
-
Efficient and resilient key discovery based on pseudo-random key pre-deployment
-
R.D. Pietro, L.V. Mancini, A. Mei, Efficient and resilient key discovery based on pseudo-random key pre-deployment, in: Proc. IEEE IPDPS, 2004, pp. 217-224.
-
(2004)
Proc. IEEE IPDPS
, pp. 217-224
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
10
-
-
84943553152
-
Establishing pairwise key for secure communication in ad-hoc network: A probabilistic approach
-
S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing pairwise key for secure communication in ad-hoc network: a probabilistic approach, in: Proc. IEEE ICNP, 2003, pp. 326-335.
-
(2003)
Proc. IEEE ICNP
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
11
-
-
34547411877
-
A two-layer key establishment scheme for wireless sensor networks
-
DOI 10.1109/TMC.2007.1008
-
Y. Zhou, and Y. Fang A two-layer key establishment scheme for wireless sensor networks IEEE Trans. Mobile Comput. 6 9 2007 1009 1020 (Pubitemid 47171282)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.9
, pp. 1009-1020
-
-
Zhou, Y.1
Fang, Y.2
-
12
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proc. IEEE INFOCOM, 2004, pp. 586-594.
-
(2004)
Proc. IEEE INFOCOM
, pp. 586-594
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
13
-
-
24944580409
-
LLK: A link-layer key establishment scheme in wireless sensor networks
-
Y. Zhou, Y. Zhang, Y. Fang, LLK: a link-layer key establishment scheme in wireless sensor networks, in: Proc. IEEE WCNC, 2005, pp. 1912-1926.
-
(2005)
Proc. IEEE WCNC
, pp. 1912-1926
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
-
14
-
-
52349091672
-
A key predistribution scheme with matrix decomposition for secure wireless sensor networks
-
H. Dai, H. Xu, A key predistribution scheme with matrix decomposition for secure wireless sensor networks, in: Proc. IEEE World Congr. Intell. Control Automat., 2008, pp. 1724-1727.
-
(2008)
Proc. IEEE World Congr. Intell. Control Automat.
, pp. 1724-1727
-
-
Dai, H.1
Xu, H.2
-
15
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
R. Blom, An optimal class of symmetric key generation systems, in: Proc. ACM EUROCRYPT, 1985, pp. 335-338.
-
(1985)
Proc. ACM EUROCRYPT
, pp. 335-338
-
-
Blom, R.1
-
16
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li Establishing pairwise keys in distributed sensor networks ACM Trans. Inform. Syst. Security 8 1 2005 41 47
-
(2005)
ACM Trans. Inform. Syst. Security
, vol.8
, Issue.1
, pp. 41-47
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
17
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
DOI 10.1109/TNET.2007.892879
-
S.A. Camptepe, and B. Yener Combinatorial design of key distribution mechanisms for wireless sensor networks IEEE/ACM Trans. Netw. 15 2 2007 346 358 (Pubitemid 46621615)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.2
, pp. 346-358
-
-
Camtepe, S.A.1
Yener, B.2
-
18
-
-
85028765277
-
Perfecly-secure key distribution for dynamic conferences
-
C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, Perfecly-secure key distribution for dynamic conferences, in: Proc. ACM Adv. Cryptology, 1992, pp. 471-486.
-
(1992)
Proc. ACM Adv. Cryptology
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
19
-
-
65949089027
-
A multivariate key establishment scheme for wireless sensor networks
-
F. Delgosha, and F. Fekri A multivariate key establishment scheme for wireless sensor networks IEEE Trans. Wireless Commun. 8 4 2009 1814 1824
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1814-1824
-
-
Delgosha, F.1
Fekri, F.2
-
21
-
-
34548021406
-
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
-
DOI 10.1016/j.comcom.2007.04.012, PII S014036640700165X
-
Y. Jiang, C. Lin, X. Shen, and M. Shi A DoS and fualt tolerant authentication protocol for group communications in ad hoc networks Comput. Commun., Elsevier 30 1 2007 2428 2441 (Pubitemid 47285282)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2428-2441
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
Chu, X.5
-
22
-
-
33748600970
-
Multiple key sharing and distribution scheme with (n, t) threshold for NEMO group communications
-
DOI 10.1109/JSAC.2006.875114, 1688019
-
Y. Jiang, C. Lin, X. Shen, and M. Shi Multiple key sharing distribution scheme with (n, t) threshold memchanismfor NEMO group communications IEEE J. Selected Areas Commun. 24 9 2006 1738 1747 (Pubitemid 44376101)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.9
, pp. 1738-1747
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
23
-
-
28844481518
-
Minimum-energy multicast in mobile ad hoc networks using network coding
-
DOI 10.1109/TCOMM.2005.857148
-
Y. Wu, P. Chou, and S. Kung Minimum-energy multicast in mobile ad hoc networks using network coding IEEE Trans. Commun. 53 11 2005 1906 1918 (Pubitemid 41763708)
-
(2005)
IEEE Transactions on Communications
, vol.53
, Issue.11
, pp. 1906-1918
-
-
Wu, Y.1
Chou, P.A.2
Kung, S.-Y.3
-
24
-
-
85032750989
-
Network coding for the internet and wireless networks
-
DOI 10.1109/MSP.2007.904818
-
P.A. Fragouli, and Y. Wu Network coding for internet and wireless networks IEEE Signal Process. Mag. 24 5 2007 77 85 (Pubitemid 350130507)
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.5
, pp. 77-85
-
-
Chou, P.A.1
Wu, Y.2
-
25
-
-
77953319343
-
P-coding: Secure network coding against eavesdropping attacks
-
P. Zhang, Y. Jiang, C. Lin, Y. Fan, X. Shen, P-coding: secure network coding against eavesdropping attacks, in: Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Fan, Y.4
Shen, X.5
-
26
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Y. Fan, Y. Jiang, H. Zhu, X. Shen, An efficient privacy-preserving scheme against traffic analysis attacks in network coding, in: Proc. IEEE INFOCOM, 2009, pp. 2213-2221.
-
(2009)
Proc. IEEE INFOCOM
, pp. 2213-2221
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
28
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.R. Li, and R.W. Yeung Network information flow IEEE Trans. Inform. Theor. 46 4 2000 1204 1216
-
(2000)
IEEE Trans. Inform. Theor.
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.R.3
Yeung, R.W.4
-
31
-
-
34247364655
-
Ultra-low power data storage for sensor networks
-
G. Mathur, P. Desnoyers, D. Ganesan, P. Shenoy, Ultra-low power data storage for sensor networks, in: Proc. of IEEE IPSN, 2006, pp. 374-381.
-
(2006)
Proc. of IEEE IPSN
, pp. 374-381
-
-
Mathur, G.1
Desnoyers, P.2
Ganesan, D.3
Shenoy, P.4
|