-
1
-
-
0001989185
-
A new family of authentication protocols
-
R. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas, R. Needham, "A New Family of Authentication Protocols", ACM Operating Ssystems Review, 1998.
-
(1998)
ACM Operating Ssystems Review
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.-H.4
Manifavas, C.5
Needham, R.6
-
2
-
-
33745759519
-
Authenticated queries in sensor networks
-
DOI 10.1007/11601494-5, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers
-
Z. Benenson "Authenticated Queries in Sensor Networks", Second EuropeanWorkshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS'05, LNCS 3813, pp. 54-67, Visegrad, Hungary, 2005. (Pubitemid 44012973)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3813
, pp. 54-67
-
-
Benenson, Z.1
-
3
-
-
33750315272
-
Authenticated query flooding in sensor networks
-
DOI 10.1109/PERCOMW.2006.23, 1599067, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
-
Z. Benenson, L. Pimenidis, F.C. Freiling, S. Lucks "Authenticated Query Flooding in Sensor Networks", 4th IEEE Conference on Pervasive Computing and Communications Workshops, pp. 644-647, Pisa, Italy, 2006. (Pubitemid 44612662)
-
(2006)
Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
, vol.2006
, pp. 644-647
-
-
Benenson, Z.1
Pimenidis, L.2
Hammerschmidt, E.3
Freiling, F.C.4
Lucks, S.5
-
4
-
-
84876390013
-
-
FIPS PUB 140-2, Federal Information Processing Standards Publication, National Institute of Standards and Technology
-
FIPS PUB 140-2, "Security Requirements for Cryptographic Modules", Federal Information Processing Standards Publication, National Institute of Standards and Technology.
-
Security Requirements for Cryptographic Modules
-
-
-
7
-
-
3142692234
-
Beyond average: Towards sophisticated sensing with queries
-
Palo Alto, CA, USA, April
-
J. M. Hellerstein, W. Hong, S.Madden, K. Stanek, "Beyond Average: Towards Sophisticated Sensing with Queries", In Workshop on IPSN'03, Palo Alto, CA, USA, April 2003.
-
(2003)
Workshop on IPSN'03
-
-
Hellerstein, J.M.1
Hong, W.2
Madden, S.3
Stanek, K.4
-
9
-
-
0019634370
-
Password authentication with insecure communication
-
ACM Press, New York, NY, USA
-
L. Lamport, "Password authentication with insecure communication", Commun. ACM 24(11), pp. 770-772, ACM Press, New York, NY, USA, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
11
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Summer
-
A. Perrig, R. Canetti, J.D. Tygar, D. Song, "The TESLA broadcast authentication protocol", RSA CryptoBytes, 5(Summer), 2002.
-
(2002)
RSA CryptoBytes
, vol.5
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
12
-
-
84947251443
-
The resurrecting duckling: Security issues for ad hoc wireless networks
-
volume 1796 of Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany
-
F. Stajano, R. Anderson, "The resurrecting duckling: Security issues for ad hoc wireless networks", 7th International Workshop, volume 1796 of Lecture Notes in Computer Science, pp. 172-194. Springer-Verlag, Berlin Germany, 2000.
-
(2000)
7th International Workshop
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
14
-
-
24144433244
-
Zero-common knowldge authentication for pervasive networks
-
Springer-Verlag LNCS 3006, Ottawa, Ontario, CA, August
-
A. Weimerskirch, D. Westhoff, "Zero-Common Knowldge Authentication for Pervasive Networks", 10th Selected Areas in Cryptography, SAC'03, Springer-Verlag LNCS 3006, pp. 73-87, Ottawa, Ontario, CA, August 2003.
-
(2003)
10th Selected Areas in Cryptography, SAC'03
, pp. 73-87
-
-
Weimerskirch, A.1
Westhoff, D.2
-
15
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in wireless sensor networks: Encryption, key pre-distribution and routing
-
October
-
D. Westhoff, J. Girao, M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks: Encryption, Key Pre-distribution and Routing", in IEEE Transactions on Mobile Comuting, Vol. 10, October 2006.
-
(2006)
IEEE Transactions on Mobile Comuting
, vol.10
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
17
-
-
24144459865
-
CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
-
Seoul, Korea, May
-
J. Girao, D. Westhoff, M. Schneider, "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks", In IEEE International Conference on Communications (ICC'05), Seoul, Korea, May 2005.
-
(2005)
IEEE International Conference on Communications (ICC'05)
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
18
-
-
23944487783
-
TinyDB: An acquisitional query processing system for sensor networks
-
Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein, Wei Hong, "TinyDB: an acquisitional query processing system for sensor networks", ACM Trans. Database Syst., Vol. 30 No 1, 2005
-
(2005)
ACM Trans. Database Syst.
, vol.30
, Issue.1
-
-
Madden, S.R.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
19
-
-
42549134558
-
Dynamic merkle trees for verifying privileges in sensor networks
-
Istanbul, Turkey, June
-
Li Zhou, Chinya V. Ravishankar, "Dynamic Merkle Trees for Verifying Privileges in Sensor Networks", In IEEE International Conference on Communications (ICC'06), Istanbul, Turkey, June 2006
-
(2006)
IEEE International Conference on Communications (ICC'06)
-
-
Zhou, L.1
Ravishankar, C.V.2
|