-
1
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In S&P '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 197, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
S&P '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
2
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
New York, NY, USA, ACM
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 42-51, New York, NY, USA, 2003. ACM.
-
(2003)
CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
3
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable Secur. Comput., 3(1):62, 2006.
-
(2006)
IEEE Trans. Dependable Secur. Comput.
, vol.3
, Issue.1
, pp. 62
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
4
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
New York, NY, USA, ACM
-
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 41-47, New York, NY, USA, 2002. ACM.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
5
-
-
70450260652
-
A simple lightweight authentic bootstrapping protocol for ipv6-based low rate wireless personal area networks (6lowpans)
-
New York, NY, USA, ACM
-
M. Ikram, A. H. Chowdhury, B. Zafar, H.-S. Cha, K.-H. Kim, S.-W. Yoo, and D.-K. Kim. A simple lightweight authentic bootstrapping protocol for ipv6-based low rate wireless personal area networks (6lowpans). In IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pages 937-941, New York, NY, USA, 2009. ACM.
-
(2009)
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing
, pp. 937-941
-
-
Ikram, M.1
Chowdhury, A.H.2
Zafar, B.3
Cha, H.-S.4
Kim, K.-H.5
Yoo, S.-W.6
Kim, D.-K.7
-
7
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
New York, NY, USA, ACM
-
D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 72-82, New York, NY, USA, 2003. ACM.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 72-82
-
-
Liu, D.1
Ning, P.2
-
8
-
-
33749033368
-
Group-based key pre-distribution in wireless sensor networks
-
New York, NY, USA, ACM
-
D. Liu, P. Ning, and W. Du. Group-based key pre-distribution in wireless sensor networks. In WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pages 11-20, New York, NY, USA, 2005. ACM.
-
(2005)
WiSe '05: Proceedings of the 4th ACM Workshop on Wireless Security
, pp. 11-20
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
9
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
DOI 10.1145/1053283.1053287
-
D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1):41-77, 2005. (Pubitemid 40479429)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Rongfang, L.I.3
-
10
-
-
77955692643
-
Key infection, secrecy transfer, and key evolution for sensor networks
-
August
-
Z. Liu, J. Ma, Q. Pei, L. Pang, and Y. Park. Key infection, secrecy transfer, and key evolution for sensor networks. IEEE Trans. Wireless. Comm., 9:2643-2653, August 2010.
-
(2010)
IEEE Trans. Wireless. Comm.
, vol.9
, pp. 2643-2653
-
-
Liu, Z.1
Ma, J.2
Pei, Q.3
Pang, L.4
Park, Y.5
-
11
-
-
33750904440
-
Unleashing public-key cryptography in wireless sensor networks
-
On IWAP'05
-
J. Lopez. Unleashing public-key cryptography in wireless sensor networks. J. Comput. Secur., 14(5):469-482, 2006. (Pubitemid 44728272)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.5
, pp. 469-482
-
-
Lopez, J.1
-
12
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001.
-
(2001)
Proceedings of MOBICOM
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
13
-
-
78649870226
-
Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks
-
January
-
A. Rasheed and R. Mahapatra. Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Trans. Parallel Distrib. Syst., 22:176-184, January 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, pp. 176-184
-
-
Rasheed, A.1
Mahapatra, R.2
-
14
-
-
38349070825
-
Lisa: Lightweight security algorithm for wireless sensor networks
-
S. Tripathy. Lisa: Lightweight security algorithm for wireless sensor networks. In ICDCIT, pages 129-134, 2007.
-
(2007)
ICDCIT
, pp. 129-134
-
-
Tripathy, S.1
-
15
-
-
33845653685
-
A secure authenticated group key agreement protocol for resource-limited mobile devices
-
DOI 10.1093/comjnl/bxl043
-
Y.-M. Tseng. A secure authenticated group key agreement protocol for resource-limited mobile devices. Comput. J., 50:41-52, January 2007. (Pubitemid 44942654)
-
(2007)
Computer Journal
, vol.50
, Issue.1
, pp. 41-52
-
-
Tseng, Y.-M.1
-
16
-
-
70349124158
-
A lightweight key renewal scheme for clustered sensor networks
-
New York, NY, USA, ACM
-
G. Wang, D. Choi, and D. Kang. A lightweight key renewal scheme for clustered sensor networks. In ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pages 557-565, New York, NY, USA, 2009. ACM.
-
(2009)
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
, pp. 557-565
-
-
Wang, G.1
Choi, D.2
Kang, D.3
-
17
-
-
2642534140
-
Efficient and mutually authenticated key exchange for low power computing devices
-
December
-
D. S. Wong and A. H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology - ASIACRYPT'2001, December 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT'2001
-
-
Wong, D.S.1
Chan, A.H.2
-
18
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. A survey of key management schemes in wireless sensor networks. Comput. Commun., 30(11-12):2314-2341, 2007. (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
19
-
-
70449562077
-
A simple non-interactive pairwise key establishment scheme in sensor networks
-
Piscataway, NJ, USA, IEEE Press
-
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo. A simple non-interactive pairwise key establishment scheme in sensor networks. In SECON'09: Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 360-368, Piscataway, NJ, USA, 2009. IEEE Press.
-
(2009)
SECON'09: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
, pp. 360-368
-
-
Yu, C.-M.1
Lu, C.-S.2
Kuo, S.-Y.3
-
20
-
-
77955667914
-
Noninteractive pairwise key establishment for sensor networks
-
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo. Noninteractive pairwise key establishment for sensor networks. IEEE Transactions on Information Forensics and Security, 5(3):556-569, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.3
, pp. 556-569
-
-
Yu, C.-M.1
Lu, C.-S.2
Kuo, S.-Y.3
-
21
-
-
79957487965
-
Practical and secure multidimensional query framework in tiered sensor networks
-
C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo. Practical and secure multidimensional query framework in tiered sensor networks. IEEE Transactions on Information Forensics and Security, 6(2):241-255, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.2
, pp. 241-255
-
-
Yu, C.-M.1
Tsou, Y.-T.2
Lu, C.-S.3
Kuo, S.-Y.4
-
22
-
-
51649097218
-
A key management scheme using deployment knowledge for wireless sensor networks
-
Z. Yu and Y. Guan. A key management scheme using deployment knowledge for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst., 19(10):1411-1425, 2008.
-
(2008)
IEEE Trans. Parallel Distrib. Syst.
, vol.19
, Issue.10
, pp. 1411-1425
-
-
Yu, Z.1
Guan, Y.2
-
23
-
-
79955980141
-
A lightweight encryption and authentication scheme for wireless sensor networks
-
J. Zheng, J. Li, M. J. Lee, and M. Anshel. A lightweight encryption and authentication scheme for wireless sensor networks. IJSN, 1(3/4):138-146, 2006.
-
(2006)
IJSN
, vol.1
, Issue.3-4
, pp. 138-146
-
-
Zheng, J.1
Li, J.2
Lee, M.J.3
Anshel, M.4
-
24
-
-
33646400365
-
Efficient key establishment for group-based wireless sensor deployments
-
New York, NY, USA, ACM
-
L. Zhou, J. Ni, and C. V. Ravishankar. Efficient key establishment for group-based wireless sensor deployments. In WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pages 1-10, New York, NY, USA, 2005. ACM.
-
(2005)
WiSe '05: Proceedings of the 4th ACM Workshop on Wireless Security
, pp. 1-10
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.V.3
|