-
1
-
-
0004219960
-
-
Acadamic Press Inc NY
-
Bollobs, B. (1985). Random graphs. NY :Acadamic Press Inc.
-
(1985)
Random Graphs
-
-
Bollobs, B.1
-
2
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D.; & Franlin, M. (2001). Identity-based encryption from the weil pairing. In CRYPTO, pp. 213-229. Berlin: Springer. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
25844444279
-
Key management in ditributed sensor networks
-
Carman, D.; Matt, B.; Kruus, P.; Balenson, D.; & Branstad, D. (2000). Key management in ditributed sensor networks. In DARPA Sensor IT Workshop.
-
(2000)
DARPA Sensor IT Workshop
-
-
Carman, D.1
Matt, B.2
Kruus, P.3
Balenson, D.4
Branstad, D.5
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, California, May.
-
Chan, H.; Perrig, A.; & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on security and privacy, pp. 197-213, Berkeley, California, May.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
24944474308
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du, W.; & Deng, J. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In ACM CCS.
-
(2003)
ACM CCS
-
-
Du, W.1
Deng, J.2
-
7
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
November.
-
Eschenauer, L.; & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In ACM CCS, November.
-
(2002)
ACM CCS
-
-
Eschenauer, L.1
Gligor . V, D.2
-
8
-
-
0030415891
-
Security on the move: Indirect authentication using Kerberos
-
New York, November.
-
Fox, A.; & Gribble, S. D. (1996). Security on the move: Indirect authentication using Kerberos. In Mobicom, New York, November.
-
(1996)
Mobicom
-
-
Fox, A.1
Gribble . S, D.2
-
9
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Cambridge, MA, August
-
Gura, N.; Patel, A.; Wander, A.; Eberle, H.; & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In CHES, Cambridge, MA, August.
-
(2004)
CHES
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz . S, C.5
-
10
-
-
13244263673
-
-
Crossbow Technology INC
-
Crossbow Technology INC. Wireless sensor networks. http://www.xbow.com/.
-
Wireless Sensor Networks
-
-
-
11
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, November
-
Karlof, C.; Sastry, N.; & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In SENSYS, Baltimore, MD, November.
-
(2004)
SENSYS
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
12
-
-
79959523138
-
-
Liu, A.; & Ning, P. (2005)
-
Liu, A.; & Ning, P. (2005) http://discovery.csc.ncsu.edu/software/ TinyECC/.
-
-
-
-
13
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC, October.
-
Liu, D.; & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In ACM CCS, Washington, DC, October.
-
(2003)
ACM CCS
-
-
Liu, D.1
Ning, P.2
-
14
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
Santa Clara, CA, October.
-
Malan, D. J.; Welsh, M.; & Smith, M. D. (2004) A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In The first IEEE international conference on sensor and Ad Hoc communications and networks. Santa Clara, CA, October.
-
(2004)
The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks
-
-
Malan . D, J.1
Welsh, M.2
Smith . M, D.3
-
15
-
-
34247364655
-
Ultra-low power data storage for sensor networks
-
New York, NY, USA.
-
Mathur, G.; Desnoyers, P.; Ganesan, D.; & Shenoy, P. (2006). Ultra-low power data storage for sensor networks. In IPSN '06, New York, NY, USA.
-
(2006)
IPSN '06
-
-
Mathur, G.1
Desnoyers, P.2
Ganesan, D.3
Shenoy, P.4
-
16
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
10.1109/35.312841
-
B. C. Neuman T. Ts'o 1994 Kerberos: An authentication service for computer networks IEEE Communications 32 9 33 38 10.1109/35.312841
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'O, T.2
-
17
-
-
79959529705
-
Key management guideline
-
NIST October
-
NIST. (2001). Key management guideline. In Workshop Document (DRAFT), October
-
(2001)
Workshop Document (DRAFT)
-
-
-
18
-
-
33750134647
-
-
ACM/Kluwer Wireless Networks Journal (WINET) New York
-
Perrig, A.; Szewczyk, R.; Wen, V.; Culler, D.; Tygar, D. (2002). SPINS: Security protocols for sensor networks. NY: ACM/Kluwer Wireless Networks Journal (WINET).
-
(2002)
SPINS: Security Protocols for Sensor Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
19
-
-
84886501228
-
Efficient and resilient key discovery based on pseudo-random key pre-deployment
-
Di Pietro, R.; Mancini, L. V.; & Mei, A. (2006). Efficient and resilient key discovery based on pseudo-random key pre-deployment. Wireless Networks 12(6).
-
(2006)
Wireless Networks
, vol.12
, Issue.6
-
-
Di Pietro, R.1
Mancini . L, V.2
Mei, A.3
-
20
-
-
41549165648
-
Redoubtable sensor networks
-
March
-
Di Pietro, R.; Mancini, L. V.; Mei, A.; Panconesi, A.; & Radhakrishnan, J. (2008) Redoubtable sensor networks. ACM Transaction on Information and Systems Security, 11(3), March.
-
(2008)
ACM Transaction on Information and Systems Security
, vol.11
, Issue.3
-
-
Di Pietro, R.1
Mancini . L, V.2
Mei, A.3
Panconesi, A.4
Radhakrishnan, J.5
-
21
-
-
33847078464
-
Privacy enhanced access control in pervasive computing environments
-
October.
-
Ren, Kui, & Lou, Wenjing (2005). Privacy enhanced access control in pervasive computing environments. In Proceedings of BroadNet05, October.
-
(2005)
Proceedings of BroadNet05
-
-
Ren1
Kui2
Lou3
Wenjing4
-
22
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979) How to share a secret. Communications of the ACM 22(11), 612-613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
4244026973
-
From Euclid's GCD to montgomery multiplication to the great divide
-
Sun Microsystems Laboratories TR-2001-95, June
-
Shantz, S. C. (2001). From Euclid's GCD to montgomery multiplication to the great divide. In Technical report, Sun Microsystems Laboratories TR-2001-95, June.
-
(2001)
Technical Report
-
-
Shantz, S.C.1
-
24
-
-
79959502637
-
-
TinyOS 1.1.15.
-
TinyOS. TinyOS 1.1.15. http://www.tinyos.net, 2006.
-
(2006)
TinyOS
-
-
-
25
-
-
33748968113
-
LIGER: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks
-
Uppsala, Sweden, June.
-
Traynor, P.; Kumar, R.; Saad, H. B.; Cao, G.; & Porta, T. L. (2006). LIGER: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks. In MOBISYS, Uppsala, Sweden, June.
-
(2006)
MOBISYS
-
-
Traynor, P.1
Kumar, R.2
Saad . H, B.3
Cao, G.4
Porta . T, L.5
-
26
-
-
33746086383
-
Distributed user access control in sensor networks
-
Distributed Computing in Sensor Systems - Second IEEE International Conference, DCOSS 2006, Proceedings
-
Wang, H.; & Li, Q. (2006). Distributed user access control in sensor networks. In IEEE international conference on distributed computing in sensor systems(DCOSS), pp. 305-320, San Francisco, CA, June. (Pubitemid 44077833)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4026
, pp. 305-320
-
-
Wang, H.1
Li, Q.2
-
27
-
-
77954085269
-
Achieving robust message authentication in sensor networks: A public-key based approach
-
10.1007/s11276-009-0184-z
-
H. Wang Q. Li 2010 Achieving robust message authentication in sensor networks: A public-key based approach ACM Journal of Wireless Networks (WINET) 16 4 999 1009 10.1007/s11276-009-0184-z
-
(2010)
ACM Journal of Wireless Networks (WINET)
, vol.16
, Issue.4
, pp. 999-1009
-
-
Wang, H.1
Li, Q.2
-
29
-
-
51349093348
-
WM-ECC: An elliptic curve cryptography suite on sensor motes
-
College of William and Mary, Computer Science, Williamsburg, VA
-
Wang, H.; Sheng, B.; Tan, C.C.; & Li, Q. (2007). WM-ECC: An elliptic curve cryptography suite on sensor motes. Technical Report WM-CS-2007-11, College of William and Mary, Computer Science, Williamsburg, VA.
-
(2007)
Technical Report WM-CS-2007-11
-
-
Wang, H.1
Sheng, B.2
Tan . C, C.3
Li, Q.4
-
30
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
Ye, F.; Luo, H.; Lu, S.; & Zhang, L. (2004). Statistical en-route filtering of injected false data in sensor networks. In INFOCOM.
-
(2004)
INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
31
-
-
34848910920
-
Dimitrios Gunopulos, Walid A. Najjar. MicroHash: An efficient index structure for flash-based sensor devices
-
Zeinalipour-Yazti, D.; Lin, S.; & Kalogeraki, V. (2005). Dimitrios Gunopulos, Walid A. Najjar. MicroHash: An efficient index structure for flash-based sensor devices. In FAST.
-
(2005)
FAST
-
-
Zeinalipour-Yazti, D.1
Lin, S.2
Kalogeraki, V.3
-
32
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
Chicago, IL, May
-
Zhang, W.; Song, H.; Zhu, S.; & Cao, G. (2005). Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In MOBIHOC, Chicago, IL, May.
-
(2005)
MOBIHOC
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
33
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Y. Zhang W. Liu W. Lou Y. Fang 2006 Location-based compromise-tolerant security mechanisms for wireless sensor networks IEEE Journal on Selected Areas in Communications 24 2 247 260 10.1109/JSAC.2005.861382 (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
34
-
-
24944483778
-
Securing sensor networks with location-based keys
-
New Orleans, Louisiana, March
-
Zhang, Y.; Liu, W.; Lou, W.; & Fang, Y. (2005). Securing sensor networks with location-based keys. In WCNC, New Orleans, Louisiana, March.
-
(2005)
WCNC
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
35
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington D.C.; October
-
Zhu, S.; Setia, S.; & Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In ACM CCS, Washington D.C.; October.
-
(2003)
ACM CCS
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
36
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
Oakland, CA, May.
-
Zhu, S.; Setia, S.; Jajodia, S.; & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE symposium on security and privacy, Oakland, CA, May.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|