-
1
-
-
84870299675
-
Selecting key management schemes for WSN applications
-
Alcaraz, C, Lopez, J., Roman, R., Chen, H.-H.: 'Selecting key management schemes for WSN applications', Comput. Secur., 2012, 31, (8), pp. 956-966
-
(2012)
Comput. Secur.
, vol.31
, Issue.8
, pp. 956-966
-
-
Alcaraz, C.1
Lopez, J.2
Roman, R.3
Chen, H.-H.4
-
2
-
-
38049003964
-
A survey of key management in ad hoc networks
-
Hegland, A. M., Winjum, E., Mjolsnes, S. F., Rong, C, Kure, O., Spilling, P.: 'A survey of key management in ad hoc networks', Commun. Surv. Tutor., 2006, 8, (3), pp. 48-66
-
(2006)
Commun. Surv. Tutor.
, vol.8
, Issue.3
, pp. 48-66
-
-
Hegland, A.M.1
Winjum, E.2
Mjolsnes, S.F.3
Rong, C.4
Kure, O.5
Spilling, P.6
-
3
-
-
58449131864
-
A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks'
-
Hong-Kong, China, December
-
Galindo, D., Roman, R., Lopez, J.: A killer application for pairings: authenticated key establishment in underwater wireless sensor networks'. Proc. Cryptology and Network Security, Hong-Kong, China, December 2008, pp. 120-132
-
(2008)
Proc. Cryptology and Network Security
, pp. 120-132
-
-
Galindo, D.1
Roman, R.2
Lopez, J.3
-
4
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., Hellman, M. E.: 'New directions in cryptography', IEEE Trans. Inf. Theory, 1976, 22, (6), pp. 644-654
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
5
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Capkun, S., Buttyan, L., Hubaux, J.-P.: 'Self-organized public-key management for mobile ad hoc networks', IEEE Trans. Mob. Comput, 2003, 2, (1), pp. 52-64
-
(2003)
IEEE Trans. Mob. Comput
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
6
-
-
0038341106
-
A key-management scheme for distributed sensor networks'
-
CCS'02, Washington, DC, USA, November
-
Eschenauer, L., Gligor, V. D.: A key-management scheme for distributed sensor networks'. Proc. 9th ACM Conf. Computer and Communications Security (CCS'02, Washington, DC, USA, November 2002, pp. 41-47
-
(2002)
Proc. 9th ACM Conf. Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
7
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
Liu, D., Ning, P., Li, R.: 'Establishing pairwise keys in distributed sensor networks', ACM Trans. Inf. Syst Secur., 2005, 8, (1), pp. 41-77
-
(2005)
ACM Trans. Inf. Syst Secur.
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
8
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge'
-
March
-
Du, W., Deng, J., Han, Y. S., Chen, S., Varshney, P. K.: A key management scheme for wireless sensor networks using deployment knowledge'. Proc. IEEE Annual Joint Conf. IEEE Computer and Communications Societies, March 2004, vol. 1, pp. 586-597
-
(2004)
Proc. IEEE Annual Joint Conf. IEEE Computer and Communications Societies
, vol.1
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
9
-
-
0038487088
-
Randomkey predistribution schemes for sensor networks
-
Berkeley, California, USA, May
-
Chan, H., Perrig, A., Song, D.: 'Randomkey predistribution schemes for sensor networks'. Proc. IEEE Symp. Security and Privacy, Berkeley, California, USA, May 2003, pp. 197-213
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
23244467182
-
A pairwise key pre-distribution scheme for wireless sensor networks'
-
Du, W., Deng, J., Han, Y., Varshney, P., Katz, J., Khalili, A.: A pairwise key pre-distribution scheme for wireless sensor networks', ACM Trans. Inf. Syst. Secur. (TISSEC), 2005, 8, (2), pp. 228-258
-
(2005)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
Katz, J.5
Khalili, A.6
-
11
-
-
0028514601
-
An authentication service for computer networks
-
Neuman, B. C., Kerberos, T. T.: 'An authentication service for computer networks', IEEE Commun., 1994, 32, (9), pp. 33-38
-
(1994)
IEEE Commun.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Kerberos, T.T.2
-
12
-
-
77956572339
-
Random key predistribution for wireless sensor networks using deployment knowledge
-
Jaworski, J., Ren, M., Rybarczyk, K.: 'Random key predistribution for wireless sensor networks using deployment knowledge', Computing, 2009, 85, (1-2), pp. 57-76
-
(2009)
Computing
, vol.85
, Issue.1-2
, pp. 57-76
-
-
Jaworski, J.1
Ren, M.2
Rybarczyk, K.3
-
13
-
-
40049091352
-
On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs
-
Lee, J., Stinson, D. R.: 'On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs', ACM Trans. Inf. Syst. Secur., 2008, 11, (2), pp. 1-35
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, Issue.2
, pp. 1-35
-
-
Lee, J.1
Stinson, D.R.2
-
14
-
-
65949089027
-
Multivariate key-establishment schemes for wireless sensor networks
-
Delgosha, F., Fekri, F.: 'Multivariate key-establishment schemes for wireless sensor networks', IEEE Trans. Wirel. Commun., 2009, 8, (4), pp. 1814-1824
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, Issue.4
, pp. 1814-1824
-
-
Delgosha, F.1
Fekri, F.2
-
15
-
-
33847120377
-
LEAP +: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S., Setia, S., Jajodia, S.: 'LEAP +: efficient security mechanisms for large-scale distributed sensor networks', ACM Trans. Sens. Netw., 2006, 2, (4), pp. 500-528
-
(2006)
ACM Trans. Sens. Netw.
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
16
-
-
39049108308
-
C4 W: An energy efficient public key cryptosystem for large-scale wireless sensor networks
-
Vancouver, BC, October
-
Jing, Q., Hu, J., Chen, Z.: 'C4 W: an energy efficient public key cryptosystem for large-scale wireless sensor networks'. Proc. IEEE Int. Conf. Mobile Ad Hoc and Sensor Systems (MASS '06), Vancouver, BC, October 2006, pp. 827-832
-
(2006)
Proc. IEEE Int. Conf. Mobile Ad Hoc and Sensor Systems (MASS '06)
, pp. 827-832
-
-
Jing, Q.1
Hu, J.2
Chen, Z.3
-
17
-
-
0033357103
-
Securing ad hoc networks
-
Zhou, L., Haas, Z. J.: 'Securing ad hoc networks', IEEE Netw. Mag., 1999, 13, (6), pp. 24-30
-
(1999)
IEEE Netw. Mag.
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
18
-
-
84889353331
-
-
Report No. UIUCDCS-R-2004-2502, UILU-ENG-2004-1805, University of Illinois at Urbana-Champaign
-
Yi, S., Kravets, R.: 'MOCA: mobile certificate authority for wireless ad hoc networks'. Report No. UIUCDCS-R-2004-2502, UILU-ENG-2004-1805, University of Illinois at Urbana-Champaign, 2002
-
(2002)
MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks
-
-
Yi, S.1
Kravets, R.2
-
19
-
-
77957929278
-
Securing cluster-based ad hoc networks with distributed authorities
-
Li, L.-C, Liu, R.-S.: 'Securing cluster-based ad hoc networks with distributed authorities', IEEE Trans. Wirel. Commun., 2010, 9, (10), pp. 3072-3081
-
(2010)
IEEE Trans. Wirel. Commun.
, vol.9
, Issue.10
, pp. 3072-3081
-
-
Li, L.-C.1
Liu, R.-S.2
-
20
-
-
56549089407
-
A totally distributed cluster based key management model for ad hoc networks'
-
Bodrum, Turkey
-
Elhdhili, M. E., Azzouz, L. B., Kamoun, F.: A totally distributed cluster based key management model for ad hoc networks'. The Third Annual Mediterranean Ad Hoc Networking Workshop Med-Hoc-Net 2004, Bodrum, Turkey, 2004
-
(2004)
The Third Annual Mediterranean Ad Hoc Networking Workshop Med-Hoc-net 2004
-
-
Elhdhili, M.E.1
Azzouz, L.B.2
Kamoun, F.3
-
21
-
-
34147173361
-
A survey on peer-to-peer key management for mobile ad hoc networks'
-
Van Der Merwe, J., Dawoud, D. S., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks', ACM Comput. Surv., 2007, 39, (1), pp. 1-45
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
, pp. 1-45
-
-
Van Der Merwe, J.1
Dawoud, D.S.2
McDonald, S.3
-
22
-
-
81855175530
-
Survey of mobile ad hoc network attacks
-
Jawandhiya, P. M., Ghonge, M. M., Ali, M. S., Deshpande, J. S.: 'Survey of mobile ad hoc network attacks', Int. J. Eng. Sci. Technol., 2010, 2, (9), pp. 4063-4071
-
(2010)
Int. J. Eng. Sci. Technol.
, vol.2
, Issue.9
, pp. 4063-4071
-
-
Jawandhiya, P.M.1
Ghonge, M.M.2
Ali, M.S.3
Deshpande, J.S.4
-
23
-
-
80055083228
-
A secure dominating set based routing and key management scheme in mobile ad hoc Network'
-
Pushpalakshmi, R., Vincent Antony Kumar, A.: A secure dominating set based routing and key management scheme in mobile ad hoc Network', WSEAS Trans. Commun., 2011, 10, (10), pp. 297-307
-
(2011)
WSEAS Trans. Commun.
, vol.10
, Issue.10
, pp. 297-307
-
-
Pushpalakshmi, R.1
Vincent Antony Kumar, A.2
-
24
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
Berlin, Germany
-
Anderson, R., Chan, H., Perrig, A.: 'Key infection: smart trust for smart dust'. Proc. 12th IEEE Int. Conf. Network Protocols (ICNP), Berlin, Germany, 2004, pp. 206-215
-
(2004)
Proc. 12th IEEE Int. Conf. Network Protocols (ICNP)
, pp. 206-215
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
25
-
-
45849124595
-
SAKE: Software attestation for key establishment in sensor networks
-
Berlin/Heidelberg, Springer, LNCS, 5067
-
Seshadri, A., Luk, M., Perrig, A.: 'SAKE: software attestation for key establishment in sensor networks'. Distributed computing in sensor systems, Berlin/Heidelberg, Springer, 2008 (LNCS, 5067), pp. 372-385
-
(2008)
Distributed Computing in Sensor Systems
, pp. 372-385
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
-
26
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Camtepe, S., Yener, B.: 'Combinatorial design of key distribution mechanisms for wireless sensor networks', IEEE/ACM Trans. Netw., 2007, 15, (2), pp. 346-358
-
(2007)
IEEE/ACM Trans. Netw.
, vol.15
, Issue.2
, pp. 346-358
-
-
Camtepe, S.1
Yener, B.2
-
27
-
-
84899082436
-
On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs
-
Centre for Applied Cryptographic Research, University of Waterloo, November
-
Lee, J., Stinson, D. R.: 'On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs'. Technical Report, CACR 2005-05, Centre for Applied Cryptographic Research, University of Waterloo, November 2005
-
(2005)
Technical Report, CACR 2005-05
-
-
Lee, J.1
Stinson, D.R.2
-
28
-
-
64249083197
-
A key management protocol with robust continuity for sensor networks'
-
Wen, M., Zheng, Y.-F., Wen-Jun, Y., Chen, K.-F., Qiu, W.-D.: A key management protocol with robust continuity for sensor networks', Comput. Stand. Interfaces, 2009, 31, (4), pp. 642-647
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.4
, pp. 642-647
-
-
Wen, M.1
Zheng, Y.-F.2
Wen-Jun, Y.3
Chen, K.-F.4
Qiu, W.-D.5
-
29
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
New York, NY, USA
-
Liu, D., Ning, P.: 'Location-based pairwise key establishments for static sensor networks'. Proc. First ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, NY, USA, 2003, pp. 72-82
-
(2003)
Proc. First ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 72-82
-
-
Liu, D.1
Ning, P.2
-
30
-
-
66449127121
-
An efficient signal-range-based probabilistic key predistribution scheme in a wireless sensor network
-
Nguyen, H. T. T., Guizani, M., Jo, M., Huh, E.-N: 'An efficient signal-range-based probabilistic key predistribution scheme in a wireless sensor network', IEEE Trans. Veh. Technol, 2009, 58, (5), pp. 2482-2497
-
(2009)
IEEE Trans. Veh. Technol
, vol.58
, Issue.5
, pp. 2482-2497
-
-
Nguyen, H.T.T.1
Guizani, M.2
Jo, M.3
Huh, E.-N.4
-
31
-
-
39749159073
-
A framework for a distributed key management scheme in heterogeneous wireless sensor networks'
-
Lu, K, Qian, Y., Guizani, M., Chen, H.-H.: A framework for a distributed key management scheme in heterogeneous wireless sensor networks', IEEE Trans. Wirel. Commun., 2008, 7, (2), pp. 639-647
-
(2008)
IEEE Trans. Wirel. Commun.
, vol.7
, Issue.2
, pp. 639-647
-
-
Lu, K.1
Qian, Y.2
Guizani, M.3
Chen, H.-H.4
-
32
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
Miami, USA
-
Chan, H, Perrig, A.: 'PIKE: peer intermediaries for key establishment in sensor networks'. Proc. 24th Annual Joint Conf. IEEE Computer and Communication Societies (INFOCOM), Miami, USA, 2005, vol. 1, pp. 524-535
-
(2005)
Proc. 24th Annual Joint Conf. IEEE Computer and Communication Societies (INFOCOM)
, vol.1
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
33
-
-
33845444069
-
Energy-efficient group key management protocols for hierarchical sensor networks
-
Taichung, Taiwan, June
-
Panja, B., Madria, S., Bhargava, B.: 'Energy-efficient group key management protocols for hierarchical sensor networks'. Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, June 2006
-
(2006)
Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing
-
-
Panja, B.1
Madria, S.2
Bhargava, B.3
-
34
-
-
84899160348
-
A survey of dynamic key management schemes in sensor networks'
-
Cuzzocrea, A. Ed.:, IGI Global
-
Panja, B., Madria, S. K.: A survey of dynamic key management schemes in sensor networks', in Cuzzocrea, A. (Ed.): 'Intelligent techniques for warehousing and mining sensor network data' (IGI Global, 2010), pp. 326-351
-
(2010)
Intelligent Techniques for Warehousing and Mining Sensor Network Data
, pp. 326-351
-
-
Panja, B.1
Madria, S.K.2
-
35
-
-
37849028668
-
A random perturbation based scheme for pair-wise key establishment in sensor networks
-
Montreal, QC, Canada, 9-14 September
-
Zhang, W., Tran, M., Zhu, S., Cao, G.: 'A random perturbation based scheme for pair-wise key establishment in sensor networks'. Proc. Eighth ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc 07), Montreal, QC, Canada, 9-14 September 2007, pp. 90-99
-
(2007)
Proc. Eighth ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc 07)
, pp. 90-99
-
-
Zhang, W.1
Tran, M.2
Zhu, S.3
Cao, G.4
-
36
-
-
77955667914
-
Noninteractive pairwise key establishment for sensor networks
-
Yu, C, Lu, C, Kuo, S.: 'Noninteractive pairwise key establishment for sensor networks', IEEE Trans. Inf. Forensics Sec, 2010, 5, (3), pp. 556-569
-
(2010)
IEEE Trans. Inf. Forensics Sec
, vol.5
, Issue.3
, pp. 556-569
-
-
Yu, C.1
Lu, C.2
Kuo, S.3
-
37
-
-
79952574261
-
A light-weight authentication scheme for sensor networks
-
Delgado-Mohatar, O., Fuster-Sabater, A., Sierra, J.: 'A light-weight authentication scheme for sensor networks', Ad Hoc Netw., 2011, 9, (5), pp. 727-735
-
(2011)
Ad Hoc Netw.
, vol.9
, Issue.5
, pp. 727-735
-
-
Delgado-Mohatar, O.1
Fuster-Sabater, A.2
Sierra, J.3
-
38
-
-
79952143873
-
EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks
-
Zhang, X., He, J., Wei, Q.: 'EDDK: energy-efficient distributed deterministic key management for wireless sensor networks', EURASIP J. Wirel. Commun. Netw. - Spec. Issue Sec. Resilience Smart Devices Appl., 2011, 2011
-
(2011)
EURASIP J. Wirel. Commun. Netw. - Spec. Issue Sec. Resilience Smart Devices Appl., 2011
-
-
Zhang, X.1
He, J.2
Wei, Q.3
-
39
-
-
79952175802
-
A forward authentication key management scheme for heterogeneous sensor networks
-
2011
-
Huang, J., Liao, I., Hao-Wen, T.: 'A forward authentication key management scheme for heterogeneous sensor networks', EURASIP J. Wirel. Commun. Netw., 2011, 2011
-
(2011)
EURASIP J. Wirel. Commun. Netw.
-
-
Huang, J.1
Liao, I.2
Hao-Wen, T.3
-
40
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
St. Louis, USA
-
Liu, A., Ning, P.: 'TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks'. Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), St. Louis, USA, 2008, pp. 245-256
-
(2008)
Proc. Int. Conf. Information Processing in Sensor Networks (IPSN)
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
41
-
-
33646921841
-
Location aware combinatorial key management scheme for clustered sensor networks
-
Younis, M. F., Ghumman, K., Eltoweissy, M.: 'Location aware combinatorial key management scheme for clustered sensor networks', IEEE Trans. Parallel Distrib. Syst, 2006, 17, (8), pp. 865-882
-
(2006)
IEEE Trans. Parallel Distrib. Syst
, vol.17
, Issue.8
, pp. 865-882
-
-
Younis, M.F.1
Ghumman, K.2
Eltoweissy, M.3
-
42
-
-
79952353329
-
A secure mobile ad hoc network based on distributed certificate authority
-
Seno, S. A. H., Budiarto, R., Wan, T.-C: 'A secure mobile ad hoc network based on distributed certificate authority', Arab. J. Sci. Eng., 2011, 36, (1), pp. 100-114
-
(2011)
Arab. J. Sci. Eng.
, vol.36
, Issue.1
, pp. 100-114
-
-
Seno, S.A.H.1
Budiarto, R.2
Wan, T.-C.3
-
43
-
-
27944443169
-
GenMax: An efficient algorithm for mining maximal frequent itemsets
-
Gouda, K., Zaki, M. J.: 'GenMax: an efficient algorithm for mining maximal frequent itemsets', Data Min. Knowl. Discov., 2005, 11, (3), pp. 223-242
-
(2005)
Data Min. Knowl. Discov.
, vol.11
, Issue.3
, pp. 223-242
-
-
Gouda, K.1
Zaki, M.J.2
-
44
-
-
42749104092
-
Secured key exchange protocol in wireless mobile ad hoc networks
-
October
-
Liaw, S.-H., Su, P.-C, Ker-Chang Chang, H., Lu, E.-H., Pon, S.-F.: 'Secured key exchange protocol in wireless mobile ad hoc networks'. Proc. 39th Annual Int. Carnahan Conf. (CCST '05), October 2005, pp. 171-173
-
(2005)
Proc. 39th Annual Int. Carnahan Conf. (CCST '05)
, pp. 171-173
-
-
Liaw, S.-H.1
Su, P.-C.2
Ker-Chang Chang, H.3
Lu, E.-H.4
Pon, S.-F.5
|