-
2
-
-
34548493704
-
Provably unforgeable signatures
-
J. N. E. Bos and D. Chaum, "Provably unforgeable signatures," in Proc. CRYPTO, 1992, pp. 1-14.
-
(1992)
Proc. CRYPTO
, pp. 1-14
-
-
Bos, J.N.E.1
Chaum, D.2
-
3
-
-
34247325635
-
An efficient broadcast authentication scheme in wireless sensor networks
-
DOI 10.1145/1128817.1128864, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
S.-M Chang, S. Shieh, W. W. Lin, and C.-M. Hsieh, "An efficient broadcast authentication scheme in wireless sensor networks," in Proc. ASIACCS, 2006, pp. 311-320. (Pubitemid 46644749)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 311-320
-
-
Chang, S.-M.1
Shieh, S.2
Lin, W.W.3
Hsieh, C.-M.4
-
4
-
-
45849100533
-
Broadcast authentication in sensor networks. Using compressed bloom filters
-
Y.S. Chen, I.L. Lin, C.L. Lei, and Y.H. Liao, "Broadcast authentication in sensor networks. Using compressed bloom filters," in Proc. Int. Conf. Distrib. Comput. Sensor Syst., 2008, pp. 99-111.
-
(2008)
Proc. Int. Conf. Distrib. Comput. Sensor Syst.
, pp. 99-111
-
-
Chen, Y.S.1
Lin, I.L.2
Lei, C.L.3
Liao, Y.H.4
-
7
-
-
70450161107
-
Multicasting in delay tolerant networks: A social network perspective
-
W. Gao, Q. Li, B. Zhao, and G. Cao, "Multicasting in delay tolerant networks: A social network perspective," in Proc. ACM MobiHoc, 2009, pp. 299-308.
-
(2009)
Proc. ACM MobiHoc
, pp. 299-308
-
-
Gao, W.1
Li, Q.2
Zhao, B.3
Cao, G.4
-
8
-
-
82155200668
-
Analyzing naspinet data flows
-
R. Hasan, R. Bobba, and H. Khurana, "Analyzing naspinet data flows," in Proc. PSCE, 2006, pp. 1-6.
-
(2006)
Proc. PSCE
, pp. 1-6
-
-
Hasan, R.1
Bobba, R.2
Khurana, H.3
-
9
-
-
79954590260
-
Standard Communication Delivery Time Performance Requirements for Electric Power Substation Automation
-
IEEE
-
IEEE Standard Communication Delivery Time Performance Requirements for Electric Power Substation Automation, IEEE Standard 1646-2004, 2004.
-
(2004)
IEEE Standard
, pp. 1646-2004
-
-
-
10
-
-
61449182711
-
Grid of the future
-
A. Ipakchi and F. Albuyeh, "Grid of the future," PAE-M, vol. 7, no. 2, pp. 52-62, 2009.
-
(2009)
PAE-M
, vol.7
, Issue.2
, pp. 52-62
-
-
Ipakchi, A.1
Albuyeh, F.2
-
11
-
-
24944508408
-
Distillation codes and applications to dos resistant multicast authentication
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. D. Tygar, "Distillation codes and applications to dos resistant multicast authentication," in Proc. NDSS, 2004, pp. 37-56.
-
(2004)
Proc. NDSS
, pp. 37-56
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.D.5
-
12
-
-
0003605145
-
Constructing digital signatures from a one way function
-
L. Lamport, "Constructing digital signatures from a one way function," SRI Int., Tech. Rep. CSL-98, 1979.
-
(1979)
SRI Int., Tech. Rep. CSL-98
-
-
Lamport, L.1
-
13
-
-
85000276942
-
Multi-level utesla: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multi-level utesla: Broadcast authentication for distributed sensor networks," ACM Trans. Embedded Comput. Syst., vol. 3, no. 4, pp. 800-836, 2004.
-
(2004)
ACM Trans. Embedded Comput. Syst.
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
14
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
Washington DC
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks," in Proc. MOBIQUITOUS, Washington, DC, 2005, pp. 118-132.
-
(2005)
Proc. MOBIQUITOUS
, pp. 118-132
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
15
-
-
3543143146
-
Multicast authentication in fully adversarial networks
-
A. Lysyanskaya, R. Tamassia, and N. Triandopoulos, "Multicast authentication in fully adversarial networks," in Proc. IEEE Symp. Security Privacy, 2004, pp. 241-253.
-
(2004)
Proc. IEEE Symp. Security Privacy
, pp. 241-253
-
-
Lysyanskaya, A.1
Tamassia, R.2
Triandopoulos, N.3
-
17
-
-
0001263548
-
A certified digital signature
-
R. C. Merkle, "A certified digital signature," in Proc. CRYPTO, 1989, pp. 218-238.
-
(1989)
Proc. CRYPTO
, pp. 218-238
-
-
Merkle, R.C.1
-
18
-
-
17644414597
-
-
Comput. Sci. Group, Harvard Univ., Cambridge, MA, No. TR-02-02
-
M. Mitzenmacher and A. Perrig, Bounds and improvements for BiBa signature schemes, Comput. Sci. Group, Harvard Univ., Cambridge, MA, No. TR-02-02, 2002.
-
(2002)
Bounds and Improvements for BiBa Signature Schemes
-
-
Mitzenmacher, M.1
Perrig, A.2
-
19
-
-
3042690189
-
Horse: An extension of an r-time signature scheme with fast signing and verification
-
W. D. Neumann, "Horse: an extension of an r-time signature scheme with fast signing and verification," in Proc. ITCC, 2004, pp. 129-134.
-
(2004)
Proc. ITCC
, pp. 129-134
-
-
Neumann, W.D.1
-
21
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. IEEE Symp. Security Privacy, 2000, pp. 56-73.
-
(2000)
Proc. IEEE Symp. Security Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
22
-
-
82155191172
-
Efficient multicast packet authentication
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient multicast packet authentication," in Proc. NDSS, 2003, pp. 251-262.
-
(2003)
Proc. NDSS
, pp. 251-262
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
23
-
-
0010277907
-
Digitalized signatures
-
R. A. Demillo D. P. Dobkin, A. K. Jones, and R. J. Lipton, Eds. New York: Academic
-
M. O. Rabin, "Digitalized signatures," in Foundations of Secure Computation, R. A. Demillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, Eds. New York: Academic, 1978, pp. 155-166.
-
(1978)
Foundations of Secure Computation
, pp. 155-166
-
-
Rabin, M.O.1
-
24
-
-
84947431932
-
Better than BiBa: Short one-time signatures with fast signing and verifying
-
L. Reyzin and N. Reyzin, "Better than BiBa: Short one-time signatures with fast signing and verifying," in Proc. Australian Conf. Inf. Security Privacy, 2002, pp. 144-153.
-
(2002)
Proc. Australian Conf. Inf. Security Privacy
, pp. 144-153
-
-
Reyzin, L.1
Reyzin, N.2
-
25
-
-
84902345608
-
Lessons Learned from the Maroochy Water Breach
-
New York: Springer ch. 6
-
J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," in Critical Infrastructure Protection. New York: Springer, 2008, ch. 6, pp. 73-82.
-
(2008)
Critical Infrastructure Protection
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
26
-
-
0036079991
-
Expander graphs for digital stream authentication and robust overlay networks
-
D. Song, D. Zuckerman, and J. D. Tygar, "Expander graphs for digital stream authentication and robust overlay networks," in Proc. IEEE Symp. Security Privacy, 2002, pp. 258-270. (Pubitemid 34648118)
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 258-270
-
-
Song, D.1
Zuckerman, D.2
Tygar, J.D.3
-
27
-
-
71949122112
-
Ocast: Optimal multicast routing protocol for wireless sensor networks
-
L. Su, B. Ding, Y. Yang, T. Abdelzaher, G. Cao, and J. Hou, "Ocast: Optimal multicast routing protocol for wireless sensor networks," in Proc. IEEE ICNP, 2009, pp. 151-160.
-
(2009)
Proc. IEEE ICNP
, pp. 151-160
-
-
Su, L.1
Ding, B.2
Yang, Y.3
Abdelzaher, T.4
Cao, G.5
Hou, J.6
-
28
-
-
70349653420
-
Time-valid onetime signature for time critical multicast data authentication
-
Q. Wang, H. Khurana, Y. Huang, and K. Nahrstedt, "Time-valid onetime signature for time critical multicast data authentication," in Proc. IEEE INFOCOM, 2009, pp. 1233-1241.
-
(2009)
Proc. IEEE INFOCOM
, pp. 1233-1241
-
-
Wang, Q.1
Khurana, H.2
Huang, Y.3
Nahrstedt, K.4
|