-
1
-
-
0036688074
-
A survey on sensor networks
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
LNCS
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," Advances in Cryptology (CRYPTO'92), LNCS 740, pp. 471-486, 1993.
-
(1993)
Advances in Cryptology (CRYPTO'92)
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
3
-
-
34247224664
-
Key distribution mechanisms for wireless sensor networks: a survey
-
TR-05-07, Rensselaer Polytechnic Institute, March
-
S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey", Technical Report, TR-05-07, Rensselaer Polytechnic Institute, March 2005.
-
(2005)
Technical Report
-
-
Camtepe, S.A.1
Yener, B.2
-
4
-
-
84858227508
-
A survey on analytic studies of key distribution mechanisms in wireless sensor networks
-
A. K. Das, "A survey on analytic studies of key distribution mechanisms in wireless sensor networks", Journal of Information Assurance and Security, vol. 5, no. 5, pp. 526-553, 2010.
-
(2010)
Journal of Information Assurance and Security
, vol.5
, Issue.5
, pp. 526-553
-
-
Das, A.K.1
-
5
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
July-Sept
-
H. Chan, V. D. Gligor, A. Perrig and G. Murilidharan, "On the distribution and revocation of cryptographic keys in sensor networks", IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, pp. 233-247, July-Sept. 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Murilidharan, G.4
-
6
-
-
0038487088
-
Random key pre-distribution schemes for sensor networks
-
USA
-
H. Chan, A. Perrig and D. Song, "Random key pre-distribution schemes for sensor networks", IEEE Symposium on Security and Privacy, pp. 197-213, USA, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
33750111807
-
An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
-
Y. Cheng and D.P. Agrawal, "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks", Ad Hoc Networks, vol. 5, no. 1, pp. 35-48, 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 35-48
-
-
Cheng, Y.1
Agrawal, D.P.2
-
8
-
-
46749158359
-
An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
-
March
-
A. K. Das, "An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks", International Journal of Network Security, vol. 6, no. 2, pp. 134-144, March 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 134-144
-
-
Das, A.K.1
-
9
-
-
78651528527
-
A location-adaptive key establishment scheme for large-scale distributed wireless sensor networks
-
A. K. Das, "A location-adaptive key establishment scheme for large-scale distributed wireless sensor networks", Journal of Computers, vol. 4, no. 9, pp. 896-904, 2009.
-
(2009)
Journal of Computers
, vol.4
, Issue.9
, pp. 896-904
-
-
Das, A.K.1
-
10
-
-
79251556858
-
An effcient random key distribution scheme for large-scale distributed sensor networks
-
DOI:10.1002/sec.123, June
-
A. K. Das, "An effcient random key distribution scheme for large-scale distributed sensor networks", Security and Communication Networks, Published online in Wiley InterScience, DOI: 10.1002/sec.123, June 2009.
-
(2009)
Security and Communication Networks, Published online in Wiley InterScience
-
-
Das, A.K.1
-
13
-
-
28444454523
-
SECK: Survivable and effcient clustered keying for wireless sensor networks
-
WSNIA '05
-
M. Chorzempa, J. -M. Park and M. Eltoweissy, "SECK: Survivable and effcient clustered keying for wireless sensor networks", IEEE Workshop on Information Assurance in Wireless Sensor Networks, WSNIA '05, pp. 453-458, 2005.
-
(2005)
IEEE Workshop on Information Assurance in Wireless Sensor Networks
, pp. 453-458
-
-
Chorzempa, M.1
Park, J.-M.2
Eltoweissy, M.3
-
14
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffe and M. E. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, November 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffe, W.1
Hellman, M.E.2
-
15
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington DC, USA Oct
-
W. Du, J. Deng, Y. S. Han and P. K. Varshney, "A pairwise key pre-distribution scheme for wireless sensor networks", ACM Conference on Computer and Communications Security (CCS'03), pp. 42-51, Washington DC, USA, Oct. 27-31, 2003.
-
(2003)
ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
16
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, vol. IT-31, no. 4, pp. 469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
17
-
-
33646918277
-
Dynamic key management in sensor networks
-
April
-
M. Eltoweissy, M. Moharram and R. Mukkamala, "Dynamic key management in sensor networks", IEEE Communications Magazine, vol. 44, no. 4, pp. 122-130, April 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 122-130
-
-
Eltoweissy, M.1
Moharram, M.2
Mukkamala, R.3
-
19
-
-
0022793132
-
How to construct random functions
-
Oct
-
O. Goldreich, S. Goldwasser and S. Micali, "How to construct random functions", Journal of the ACM, vol. 33, no. 4, pp. 792-807, Oct. 1986.
-
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
20
-
-
0347227352
-
-
Secure hash standard, FIPS PUB 180-1, U.S. Department of Commerce, April
-
Secure hash standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995.
-
(1995)
National Institute of Standards and Technology (NIST)
-
-
-
21
-
-
84891576128
-
-
Crossbow Technology Inc.
-
Crossbow Technology Inc., Wireless Sensor networks, 2010. (http://www.xbow.com)
-
(2010)
Wireless Sensor networks
-
-
-
23
-
-
84883897746
-
A low-energy key management protocol for wireless sensor networks
-
Kemer-Antalya, Turkey, June 30 - July 3
-
G. Jolly, M. C. Kuscu, P. Kokate and M. Younis, "A low-energy key management protocol for wireless sensor networks", Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC'03), Kemer-Antalya, Turkey, June 30 - July 3 2003
-
(2003)
Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC'03)
-
-
Jolly, G.1
Kuscu, M.C.2
Kokate, P.3
Younis, M.4
-
24
-
-
0003237987
-
The Kerberos Net-work Authentication Service (V5)
-
Sep
-
J. Kohl and B. Clifford Neuman, "The Kerberos Network Authentication Service (V5)", RFC 1510, Sep. 1993.
-
(1993)
RFC 1510
-
-
Kohl, J.1
Clifford Neuman, B.2
-
25
-
-
84866860550
-
Improving key pre-distribution with deployment knowledge in static sensor networks
-
D. Liu and P. Ning, "Improving key pre-distribution with deployment knowledge in static sensor networks", ACM Transactions on Sensor Networks, vol. 1, no. 2, pp. 204-239, 2005.
-
(2005)
ACM Transactions on Sensor Networks
, vol.1
, Issue.2
, pp. 204-239
-
-
Liu, D.1
Ning, P.2
-
26
-
-
33749033368
-
Group-based key pre-distribution in wireless sensor networks
-
Sep
-
D. Liu, P. Ning and W. Du, "Group-based key pre-distribution in wireless sensor networks", Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), pp. 11-20, Sep. 2005.
-
Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005)
, vol.2005
, pp. 11-20
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
27
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning and R. Li, "Establishing pairwise keys in distributed sensor networks", ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
28
-
-
31844436263
-
A study of static versus dynamic keying schemes in sensor networks
-
Montreal, Canada Oct
-
M. Moharrum and M. Eltoweissy, "A study of static versus dynamic keying schemes in sensor networks", ACM Workshop on performance evaluation of Wireless Ad-hoc, Sensor and Ubiquitous Networks (PEWASUN 2005), pp. 122-129, Montreal, Canada, Oct. 2005.
-
(2005)
ACM Workshop on performance evaluation of Wire-less Ad-hoc Sensor and Ubiquitous Networks (PEWASUN 2005)
, pp. 122-129
-
-
Moharrum, M.1
Eltoweissy, M.2
-
29
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and de-fenses
-
26-27 Apr
-
J. Newsome, E. Shi, D. Song and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses", Proceedings of third IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004), pp. 259-268, 26-27 Apr. 2004.
-
(2004)
Proceedings of third IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
30
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
8-11 May
-
B. Parno, A. Perrig and V. Gligor, "Distributed detection of node replication attacks in sensor networks", IEEE Symposium on Security and Privacy, pp. 49-63, 8-11 May 2005.
-
IEEE Symposium on Security and Privacy
, vol.2005
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
31
-
-
78249241072
-
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
-
M. B. Paterson and D. R. Stinson, "Two attacks on a sensor network key distribution scheme of Cheng and Agrawal", Journal of Mathematical Cryptology, vol. 2, no. 4, pp. 393-403, 2008.
-
(2008)
Journal of Mathematical Cryptology
, vol.2
, Issue.4
, pp. 393-403
-
-
Paterson, M.B.1
Stinson, D.R.2
-
33
-
-
0017930809
-
A method for obtaining digital signatures and publickey cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir and L. M. Adleman, "A method for obtaining digital signatures and publickey cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
36
-
-
14344260955
-
Robust key establishment in sensor networks
-
March
-
Y. Wang, "Robust key establishment in sensor networks", ACM SIGMOD Record, vol. 33, no. 1, pp. 14-19, March 2004.
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 14-19
-
-
Wang, Y.1
-
37
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu and M. Galloway, "A survey of key management schemes in wireless sensor networks", Computer Communications, vol. 30, no. 11-12, pp. 2314-2341, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
38
-
-
48049095381
-
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
-
August
-
Y. Zhang, D. Gu and J. Li, "Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks", Computer Communications, vol. 31, no. 13, pp. 2959-2971, August 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.13
, pp. 2959-2971
-
-
Zhang, Y.1
Gu, D.2
Li, J.3
-
39
-
-
33847120377
-
LEAP+: Effcient security mechanisms for large-scale distributed sensor networks
-
November
-
S. Zhu, S. Setia and S. Jajodia, "LEAP+: Effcient security mechanisms for large-scale distributed sensor networks", ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500-528, November 2006.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|