-
1
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
Nov.
-
K. Ren, W. Lou, K. Zeng, and P. J. Moran, "On broadcast authentication in wireless sensor networks, " IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
3
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J. D. Song, and D. Tygar, "Efficient authentication and signing of multicast streams over lossy channels, " in Proc. IEEE Symp. Security Privacy, May 2000, pp. 56-73.
-
(2000)
Proc. IEEE Symp. Security Privacy, May
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Song, J.D.3
Tygar, D.4
-
4
-
-
34547466172
-
Seven cardinal properties of sensor network broadcast authentication
-
M. Luk, A. Perrig, and B. Whillock, "Seven cardinal properties of sensor network broadcast authentication, " in Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw. (SASN), 2006, pp. 147-156.
-
(2006)
Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw. (SASN)
, pp. 147-156
-
-
Luk, M.1
Perrig, A.2
Whillock, B.3
-
5
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 21-32.
-
(2009)
Proc. ACM Conf. Comput. Commun. Security
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
6
-
-
82155162323
-
UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications
-
Dec.
-
H. Guo, Y. Wu, F. Bao, H. Chen, and M. Ma, "UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 707-714, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 707-714
-
-
Guo, H.1
Wu, Y.2
Bao, F.3
Chen, H.4
Ma, M.5
-
7
-
-
70349653420
-
Time valid onetime signature for time-critical multicast data authentication
-
Q. Wang, H. Khurana, Y. Huang, and K. Nahrstedt, "Time valid onetime signature for time-critical multicast data authentication, " in Proc. IEEE INFOCOM, Apr. 2009, pp. 1233-1241.
-
(2009)
Proc. IEEE INFOCOM, Apr.
, pp. 1233-1241
-
-
Wang, Q.1
Khurana, H.2
Huang, Y.3
Nahrstedt, K.4
-
8
-
-
82155192847
-
Multicast authentication in the smart grid with onetime signature
-
Dec.
-
Q. Li and G. Cao, "Multicast authentication in the smart grid with onetime signature, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 686-696, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 686-696
-
-
Li, Q.1
Cao, G.2
-
9
-
-
79951648231
-
Review and evaluation of security threats on the communication networks in the smart grid
-
Z. Lu, X. Lu, W. Wang, and C. Wang, "Review and evaluation of security threats on the communication networks in the smart grid, " in Proc. Military Commun. Conf. (MILCOM), Oct./Nov. 2010, pp. 1830-1835.
-
(2010)
Proc. Military Commun. Conf. (MILCOM), Oct./Nov.
, pp. 1830-1835
-
-
Lu, Z.1
Lu, X.2
Wang, W.3
Wang, C.4
-
11
-
-
84945118556
-
Lower bounds for multicast message authentication
-
[Online]
-
D. Boneh, G. Durfee, and M. K. Franklin, "Lower bounds for multicast message authentication, " in Proc. Int. Conf. Theory Appl. Cryptograph. Techn., 2001, pp. 437-452. [Online]. Available: http://dl.acm.org/citation.cfm?id=647086.715684
-
(2001)
Proc. Int. Conf. Theory Appl. Cryptograph. Techn.
, pp. 437-452
-
-
Boneh, D.1
Durfee, G.2
Franklin, M.K.3
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
Jul.
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks, " in Proc. 2nd Annu. Int. Conf. Mobile Ubiquitous Syst., Netw. Services (MobiQuitous), Jul. 2005, pp. 118-129.
-
(2005)
Proc. 2nd Annu. Int. Conf. Mobile Ubiquitous Syst., Netw. Services (MobiQuitous)
, pp. 118-129
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
15
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sep.
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks, " Wireless Netw., vol. 8, no. 5, pp. 521-534, Sep. 2002.
-
(2002)
Wireless Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
16
-
-
3543143146
-
Multicast authentication in fully adversarial networks
-
A. Lysyanskaya, R. Tamassia, and N. Triandopoulos, "Multicast authentication in fully adversarial networks, " in Proc. IEEE Symp. Security Privacy, May 2004, pp. 241-253.
-
(2004)
Proc. IEEE Symp. Security Privacy, May
, pp. 241-253
-
-
Lysyanskaya, A.1
Tamassia, R.2
Triandopoulos, N.3
-
17
-
-
0032594123
-
Digital signatures for flows and multicasts
-
Aug.
-
C. K. Wong and S. S. Lam, "Digital signatures for flows and multicasts, " IEEE Trans. Netw., vol. 7, no. 4, pp. 502-513, Aug. 1999.
-
(1999)
IEEE Trans. Netw.
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.K.1
Lam, S.S.2
-
19
-
-
0036079874
-
Efficient multicast packet authentication using signature amortization
-
J. M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast packet authentication using signature amortization, " in Proc. IEEE Symp. Security Privacy, May 2002, pp. 227-240.
-
(2002)
Proc. IEEE Symp. Security Privacy, May
, pp. 227-240
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
20
-
-
0003605145
-
-
Dept. Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA, Tech. Rep. CSL-98 Oct.
-
L. Lamport, "Constructing digital signatures from a one-way function, " Dept. Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA, Tech. Rep. CSL-98, Oct. 1979.
-
(1979)
Constructing Digital Signatures from A One-way Function
-
-
Lamport, L.1
-
21
-
-
0035752112
-
The BiBa one-time signature and broadcast authentication protocol
-
A. Perrig, "The BiBa one-time signature and broadcast authentication protocol, " in Proc. 8th ACM Conf. Comput. Commun. Security, Nov. 2001, pp. 28-37.
-
(2001)
Proc. 8th ACM Conf. Comput. Commun. Security, Nov.
, pp. 28-37
-
-
Perrig, A.1
-
23
-
-
34548472878
-
Multiple-time signature schemes against adaptive chosen message attacks
-
J. Pieprzyk, H. Wang, and C. Xing, "Multiple-time signature schemes against adaptive chosen message attacks, " in Proc. 10th Annu. Int. Sel. Areas Cryptograph. (SAC), 2003, pp. 88-100.
-
(2003)
Proc. 10th Annu. Int. Sel. Areas Cryptograph. (SAC)
, pp. 88-100
-
-
Pieprzyk, J.1
Wang, H.2
Xing, C.3
-
24
-
-
3042690189
-
HORSE: An extension of an r-time signature scheme with fast signing and verification
-
Apr.
-
W. D. Neumann, "HORSE: An extension of an r-time signature scheme with fast signing and verification, " in Proc. Int. Conf. Inf. Technol., Coding Comput. (ITCC), vol. 2. Apr. 2004, pp. 129-134.
-
(2004)
Proc. Int. Conf. Inf. Technol., Coding Comput. (ITCC)
, vol.2
, pp. 129-134
-
-
Neumann, W.D.1
-
26
-
-
0041863206
-
Can D.S.A. Be improved?-Complexity trade-offs with the digital signature standard
-
D. Naccache, D. M'Raïhi, S. Vaudenay, and D. Raphaeli, "Can D.S.A. be improved?-Complexity trade-offs with the digital signature standard, " in Proc. 13th Int. Conf. Theory Appl. Cryptograph. Techn. (EUROCRYPT), 1994, pp. 77-85.
-
(1994)
Proc. 13th Int. Conf. Theory Appl. Cryptograph. Techn. (EUROCRYPT)
, pp. 77-85
-
-
Naccache, D.1
M'Raïhi, D.2
Vaudenay, S.3
Raphaeli, D.4
-
29
-
-
0003614758
-
-
Dept. Comput. Sci. Lab., Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep. MIT/LCS/TR-212
-
M. O. Rabin, "Digitalized signatures and public-key functions as intractable as factorization, " Dept. Comput. Sci. Lab., Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep. MIT/LCS/TR-212, 1979.
-
(1979)
Digitalized Signatures and Public-key Functions As Intractable As Factorization
-
-
Rabin, M.O.1
-
30
-
-
33845255980
-
HIMUTSIS: Hierarchical multi-tier adaptive ad-hoc network security protocol based on signcryp-tion type key exchange schemes
-
A. A. Yavuz, F. Alagöz, and E. Anarim, "HIMUTSIS: Hierarchical multi-tier adaptive ad-hoc network security protocol based on signcryp-tion type key exchange schemes, " in Proc. 21th Int. Symp. Comput. Inf. Sci. (ISCIS), 2006, pp. 434-444.
-
(2006)
Proc. 21th Int. Symp. Comput. Inf. Sci. (ISCIS)
, pp. 434-444
-
-
Yavuz, A.A.1
Alagöz, F.2
Anarim, E.3
-
31
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases, " ACM Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006.
-
(2006)
ACM Trans. Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
33
-
-
34247325635
-
An efficient broadcast authentication scheme in wireless sensor networks
-
S.-M. Chang, S. Shieh, W. W. Lin, and C.-M. Hsieh, "An efficient broadcast authentication scheme in wireless sensor networks, " in Proc. ACM Symp. Inf., Comput. Commun. Security, 2006, pp. 311-320.
-
(2006)
Proc. ACM Symp. Inf., Comput. Commun. Security
, pp. 311-320
-
-
Chang, S.-M.1
Shieh, S.2
Lin, W.W.3
Hsieh, C.-M.4
-
34
-
-
41149145872
-
-
UCSD CSE Course, 1st ed. [Online]
-
M. Bellare and P. Rogaway, "Introduction to modern cryptography, " in UCSD CSE Course, 1st ed., 2005, p. 207, [Online]. Available: http://www.cs.ucsd.edu/∼mihir/cse207/classnotes.html
-
(2005)
Introduction to Modern Cryptography
, pp. 207
-
-
Bellare, M.1
Rogaway, P.2
-
35
-
-
35048891654
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
Sep.
-
E. Mykletun, M. Narasimha, and G. Tsudik, "Signature bouquets: Immutability for aggregated/condensed signatures, " in Proc. 9th Eur. Symp. Res. Comput. Security, Sep. 2004, pp. 160-176.
-
(2004)
Proc. 9th Eur. Symp. Res. Comput. Security
, pp. 160-176
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
36
-
-
85028913061
-
Online/offline digital signatures
-
New York, NY, USA: Springer-Verlag
-
S. Even, O. Goldreich, and S. Micali, "Online/offline digital signatures, " in Advances in Cryptology. New York, NY, USA: Springer-Verlag, 1989, pp. 263-275.
-
(1989)
Advances in Cryptology
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
|