-
1
-
-
0010461175
-
-
NAI Labs Technical Report no. 00010, Sep.
-
D. W. Carman, P. S. Kruus, and B. J. Matt, Constraints and Approaches for Distributed Sensor Network Security, NAI Labs Technical Report, no. 00010, Sep. 2000.
-
(2000)
Constraints and Approaches for Distributed Sensor Network Security
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
2
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," Proceedings of 2003 Symposium on Security and Privacy, pp. 197-213, May 2003.
-
(2003)
Proceedings of 2003 Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
4344668573
-
Overview of sensor networks
-
Aug
-
D. Culler, D. Estrin, and M Srivastava, "Overview of sensor networks," IEEE Computer Society, vol. 37, no. 8, pp. 41-49, Aug. 2004.
-
(2004)
IEEE Computer Society
, vol.37
, Issue.8
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.3
-
4
-
-
33847255502
-
A practical study of transitory master key establishment for wireless sensor networks
-
Athens, Greece, Sep.
-
J. Deng, C. Hartung, R. Han, and S. Mishra, "A practical study of transitory master key establishment for wireless sensor networks," Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 289-302, Athens, Greece, Sep. 2005.
-
(2005)
Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 289-302
-
-
Deng, J.1
Hartung, C.2
Han, R.3
Mishra, S.4
-
5
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
Jan.-Mar
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Transaction on Dependable and Secure Computing, vol. 3, no. 1, pp. 62-77, Jan.-Mar. 2006.
-
(2006)
IEEE Transaction on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
7
-
-
3142512728
-
Tree-based group key agreement
-
Feb.
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement," ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 60-96, Feb. 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
8
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
ACM Press, New York, NY
-
D. Liu, and P. Ning, "Location-based pairwise key establishments for static sensor networks," Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 72-82, ACM Press, New York, NY, 2003.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 72-82
-
-
Liu, D.1
Ning, P.2
-
9
-
-
31844452794
-
Efficient hybrid key agreement protocol for wireless ad hoc networks
-
Oct
-
X. Li, Y. Wang, and O. Frieder, "Efficient hybrid key agreement protocol for wireless ad hoc networks," Proceedings of 11th Intl. Conference on Computer Communications and Networks, pp. 404-409, Oct. 2002.
-
(2002)
Proceedings of 11th Intl. Conference on Computer Communications and Networks
, pp. 404-409
-
-
Li, X.1
Wang, Y.2
Frieder, O.3
-
10
-
-
84866860550
-
Improving key predistribution with deployment knowledge in static sensor networks
-
D. Liu, and P. Ning, "Improving key predistribution with deployment knowledge in static sensor networks," TOSN, vol. 1, no. 2, pp. 204-239, 2005.
-
(2005)
TOSN
, vol.1
, Issue.2
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
11
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transaction Information System Security vol. 8, no. 1, pp. 41-77, 2005.
-
(2005)
ACM Transaction Information System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
12
-
-
33751174487
-
Dynamic combinatorial key management scheme for sensor networks
-
M. A. Moharrum, M. Eltoweissy, and R. Mukkamala, "Dynamic combinatorial key management scheme for sensor networks," Wireless Communications and Mobile Computing 2006, pp. 1017-1035, 2006.
-
(2006)
Wireless Communications and Mobile Computing 2006
, pp. 1017-1035
-
-
Moharrum, M.A.1
Eltoweissy, M.2
Mukkamala, R.3
-
13
-
-
33845444069
-
Energy and communication efficient group key management protocol for hierarchical sensor networks
-
Taichung, Taiwan, June
-
B. Panja, S. Madria, and B. Bhargava, "Energy and communication efficient group key management protocol for hierarchical sensor networks," Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, pp. 384-393, Taichung, Taiwan, June 2006.
-
(2006)
Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, vol.1
, pp. 384-393
-
-
Panja, B.1
Madria, S.2
Bhargava, B.3
-
14
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, "SPINS: Security protocols for sensor networks," Proceedings of 7th Annual International Conference on Mobile Computing and Networks, pp. 189-199, Rome, Italy, 2001.
-
(2001)
Proceedings of 7th Annual International Conference on Mobile Computing and Networks
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
15
-
-
85061541364
-
A secure key management scheme for sensor networks
-
New York, Aug.
-
A. Price, K. Kosaka, S. Chatterjee, "A secure key management scheme for sensor networks," Proceedings of the Tenth Americas Conference on Information Systems, pp. 1739-1745, New York, Aug. 2004.
-
(2004)
Proceedings of the Tenth Americas Conference on Information Systems
, pp. 1739-1745
-
-
Price, A.1
Kosaka, K.2
Chatterjee, S.3
-
16
-
-
33745810944
-
Self-organizing sensor sub-network protocol for structural health monitoring
-
Feb.
-
S. Ratnaraj, S. Jagannathan, and V. Rao, "Selforganizing sensor sub-network protocol for structural health monitoring," Proceedings of the SPIE, vol. 6167, pp. 142-149, Feb. 2006.
-
(2006)
Proceedings of the SPIE
, vol.6167
, pp. 142-149
-
-
Ratnaraj, S.1
Jagannathan, S.2
Rao, V.3
-
18
-
-
84886490515
-
A general probabilistic model for improving key assignment in wireless networks
-
P. Tague, and R. Poovendran, "A general probabilistic model for improving key assignment in wireless networks," WiOpt 2006, pp. 251-259, 2006.
-
(2006)
WiOpt
, pp. 251-259
-
-
Tague, P.1
Poovendran, R.2
-
19
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks
-
June
-
P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, "Efficient hybrid security mechanisms for heterogeneous sensor networks," IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 663-677, June 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.6
, pp. 663-677
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
La Porta, T.6
-
20
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington D.C., Oct.
-
S. Zhu, S. Setia and S. Jajodia, "LEAP: Efficient security mechanisms for largescale distributed sensor networks," Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 62-72,, Washington D.C., Oct. 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)
, pp. 6272
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|