-
1
-
-
2942686425
-
Sensor networks: Evolution, opportunities and challenges
-
C.Y. Chong, and S. Kumar Sensor networks: evolution, opportunities and challenges Proc. IEEE 91 8 2003 1247 1256
-
(2003)
Proc. IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
2
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
September
-
A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, J. Anderson, Wireless Sensor Networks for Habitat Monitoring, in: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, September 2002, pp. 88-97.
-
(2002)
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications
, pp. 88-97
-
-
Mainwaring, A.1
Polastre, J.2
Szewczyk, R.3
Culler, D.4
Anderson, J.5
-
3
-
-
34547371054
-
System architecture of a wireless body area sensor network for ubiquitous health monitoring
-
C. Otto, A. Milenkovic, C. Sanders, and E. Jovanov System architecture of a wireless body area sensor network for ubiquitous health monitoring J. Mobile Multimedia 1 4 2006 307 326
-
(2006)
J. Mobile Multimedia
, vol.1
, Issue.4
, pp. 307-326
-
-
Otto, C.1
Milenkovic, A.2
Sanders, C.3
Jovanov, E.4
-
5
-
-
84944457899
-
Rapid prototyping of mobile input devices using wireless sensor nodes
-
October
-
J. Carlson, R. Han, S. Lao, C. Narayan, S. Ghani, Rapid Prototyping of Mobile Input Devices Using Wireless Sensor Nodes, in: Proceedings of the 5th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '03), October 2003, pp. 21-29.
-
(2003)
Proceedings of the 5th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '03)
, pp. 21-29
-
-
Carlson, J.1
Han, R.2
Lao, S.3
Narayan, C.4
Ghani, S.5
-
6
-
-
79960755996
-
A single mobile target tracking in voronoi-based clustered wireless sensor network
-
J.H. Chen, M.B. Salim, and M. Matsumoto A single mobile target tracking in voronoi-based clustered wireless sensor network J. Inf. Process. Syst. 7 1 2011 17 28
-
(2011)
J. Inf. Process. Syst
, vol.7
, Issue.1
, pp. 17-28
-
-
Chen, J.H.1
Salim, M.B.2
Matsumoto, M.3
-
7
-
-
84255212842
-
Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks
-
D. Kumar, T.C. Aseri, and R.B. Patel Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks Int. J. Inf. Technol. Commun. Conver. 1 2 2011 130 145
-
(2011)
Int. J. Inf. Technol. Commun. Conver
, vol.1
, Issue.2
, pp. 130-145
-
-
Kumar, D.1
Aseri, T.C.2
Patel, R.B.3
-
8
-
-
84875527298
-
Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks
-
G. Zhao, and A. Kumar Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks Int. J. Inf. Technol. Commun. Conver. 1 3 2011 297 317
-
(2011)
Int. J. Inf. Technol. Commun. Conver
, vol.1
, Issue.3
, pp. 297-317
-
-
Zhao, G.1
Kumar, A.2
-
9
-
-
59249100315
-
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
-
B. Li, and L. Batten Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks J. Network Comput. Appl. 32 2009 377 387
-
(2009)
J. Network Comput. Appl
, vol.32
, pp. 377-387
-
-
Li, B.1
Batten, L.2
-
10
-
-
78649332013
-
A novel node level security policy framework for wireless sensor networks
-
W.R. Claycomb, and D. Shin A novel node level security policy framework for wireless sensor networks J. Network Comput. Appl. 34 2011 418 428
-
(2011)
J. Network Comput. Appl
, vol.34
, pp. 418-428
-
-
Claycomb, W.R.1
Shin, D.2
-
12
-
-
0037086890
-
Wireless sensor networks: A survey
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci Wireless sensor networks: a survey Int. J. Comput. Telecommun. Networks 38 4 2002 393 422
-
(2002)
Int. J. Comput. Telecommun. Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
13
-
-
78650370213
-
A user authentication scheme based on identity-bits commitment for wireless sensor networks
-
N. Jamil, S.S. Sameon, R. Mahmood, A User Authentication Scheme Based on Identity-bits Commitment for Wireless Sensor Networks, in: Second International Conference on Network Applications, Protocols and Services, 2010, pp. 61-66.
-
(2010)
Second International Conference on Network Applications, Protocols and Services
, pp. 61-66
-
-
Jamil, N.1
Sameon, S.S.2
Mahmood, R.3
-
14
-
-
84860762438
-
Security in wireless sensor network: A survey
-
V. Rathod, and M. Mehta Security in wireless sensor network: a survey GANPAT Univ. J. Eng. Technol. 1 1 2011 35 44
-
(2011)
GANPAT Univ. J. Eng. Technol
, vol.1
, Issue.1
, pp. 35-44
-
-
Rathod, V.1
Mehta, M.2
-
18
-
-
11244354854
-
Security Considerations for IEEE 802.15.4 Networks
-
N. Sastry, D. Wagner, Security Considerations for IEEE 802.15.4 Networks, in: Proc. ACM Workshop Wireless Security, ACM Press, 2004, pp. 32-42.
-
(2004)
Proc. ACM Workshop Wireless Security, ACM Press
, pp. 32-42
-
-
Sastry, N.1
Wagner, D.2
-
19
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar SPINS: security protocols for sensor networks ACM Wireless Networks 8 5 2002 521 534
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
20
-
-
34347217295
-
-
Auerbach Publications, CRC Press
-
J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary Wireless Sensor Network Security: A Survey, Security in Distributed, Grid, and Pervasive Computing 2006 Auerbach Publications, CRC Press
-
(2006)
Wireless Sensor Network Security: A Survey, Security in Distributed, Grid, and Pervasive Computing
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
21
-
-
78549260205
-
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks
-
T. Naeem, and K.K. Loo Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks Int. J. Digital Content Technol. Its Appl. JDCTA 3 1 2009 88 93
-
(2009)
Int. J. Digital Content Technol. Its Appl. JDCTA
, vol.3
, Issue.1
, pp. 88-93
-
-
Naeem, T.1
Loo, K.K.2
-
22
-
-
78651575800
-
High effect secure data transmission mechanisms in wireless sensor networks using ID-based key management scheme
-
H.Y. Lin High effect secure data transmission mechanisms in wireless sensor networks using ID-based key management scheme J. Conver. Inform. Technol. 4 1 2009 77 83
-
(2009)
J. Conver. Inform. Technol
, vol.4
, Issue.1
, pp. 77-83
-
-
Lin, H.Y.1
-
23
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
C.Y. Chong, and S. Kumar Sensor networks: evolution, opportunities, and challenges Proc. IEEE 91 8 2003 1247 1256
-
(2003)
Proc. IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
24
-
-
79957944903
-
Secure key management protocol in the wireless sensor network
-
Y.S. Jeong, and S.H. Lee Secure key management protocol in the wireless sensor network J. Inf. Process. Syst. 2 1 2006 48 51
-
(2006)
J. Inf. Process. Syst
, vol.2
, Issue.1
, pp. 48-51
-
-
Jeong, Y.S.1
Lee, S.H.2
-
25
-
-
84856665180
-
Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
-
Y. Ponomarchuk, and D.W. Seo Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks J. Conver. 1 1 2010 35 42
-
(2010)
J. Conver
, vol.1
, Issue.1
, pp. 35-42
-
-
Ponomarchuk, Y.1
Seo, D.W.2
-
26
-
-
84867615498
-
Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs
-
P. Sarkar, and A. Saha Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs J. Conver. 2 1 2011 23 30
-
(2011)
J. Conver
, vol.2
, Issue.1
, pp. 23-30
-
-
Sarkar, P.1
Saha, A.2
-
28
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
ACM Press
-
C. Karlof, N. Sastry, D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, Proc. International Conf. Embedded Networked Sensor Syst., ACM Press, 2004, pp. 162-175.
-
(2004)
Proc. International Conf. Embedded Networked Sensor Syst
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
29
-
-
34648831060
-
A survey of authentication mechanisms: Authentication for ad-hoc wireless sensor networks
-
SAS '07, IEEE 2007
-
P. Boyle, T. Newe, A Survey of Authentication Mechanisms: Authentication for Ad-Hoc Wireless Sensor Networks, Sensors Applications Symposium, 2007. SAS '07, IEEE 2007, pp. 1-6.
-
(2007)
Sensors Applications Symposium
, pp. 1-6
-
-
Boyle, P.1
Newe, T.2
-
30
-
-
84919453382
-
User authentication in sensor networks
-
Z. Benenson, F. Gartner, D. Kesdogan, User Authentication in Sensor Networks, Proc. Workshop Sensor Networks, Lecture Notes Informatics Proceedings Informatik, 2004.
-
(2004)
Proc. Workshop Sensor Networks, Lecture Notes Informatics Proceedings Informatik
-
-
Benenson, Z.1
Gartner, F.2
Kesdogan, D.3
-
31
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruus, TinyPK: Securing Sensor Networks with Public Key Technology, Proc. ACM Workshop Security of Ad Hoc Sensor Networks, 2004, pp. 59-64.
-
(2004)
Proc. ACM Workshop Security of Ad Hoc Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
33
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M.L. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wireless. Commun. 8 2009 1086 1090
-
(2009)
IEEE Trans. Wireless. Commun
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
34
-
-
84921574472
-
-
Workshop on Real-World Wireless Sensor Networks, Sweden, June
-
Z. Benenson, N. Gedicke, O. Raivio, Realizing Robust User Authentication in Sensor Networks, Workshop on Real-World Wireless Sensor Networks, Sweden, June 2005.
-
(2005)
Realizing Robust User Authentication in Sensor Networks
-
-
Benenson, Z.1
Gedicke, N.2
Raivio, O.3
-
35
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
California, October
-
D. Malan, M. Welsh, M. Smith, A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography, First IEEE International Conference on Sensor and Ad Hoc Communications and Network, California, October 2004.
-
(2004)
First IEEE International Conference on Sensor and Ad Hoc Communications and Network
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
36
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K. Wong, Y. Zheng, J. Cao, S. Wang, A Dynamic User Authentication Scheme for Wireless Sensor Networks, in: Proc. IEEE International Conf. Sensor Networks, Ubiquitous, Trustworthy Computing, IEEE Computer Society, 2006, pp. 244-251.
-
(2006)
Proc. IEEE International Conf. Sensor Networks, Ubiquitous, Trustworthy Computing, IEEE Computer Society
, pp. 244-251
-
-
Wong, K.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
37
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
Washington, DC, USA, 26-30 November
-
H.R. Tseng, R.H. Jan, W. Yang, An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks, in: Proceedings of IEEE Globecom, Washington, DC, USA, 26-30 November 2007, pp. 986-990.
-
(2007)
Proceedings of IEEE Globecom
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
39
-
-
74049156258
-
Robust dynamic user authentication scheme for wireless sensor networks
-
Tenerife, Spain, October
-
B. Vaidya, J.S. Silva, J.J. Rodrigues, Robust Dynamic User Authentication Scheme for Wireless Sensor Networks, in: Proc. of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, Spain, October 2009, pp. 88-91.
-
(2009)
Proc. of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009)
, pp. 88-91
-
-
Vaidya, B.1
Silva, J.S.2
Rodrigues, J.J.3
-
40
-
-
78649892483
-
Password renewal enhancement for dynamic authentication in wireless sensor networks
-
Communication Systems and Networks (CICSyN), Liverpool, 28-30 July
-
F. Kiani, G. Dalkilic, Password Renewal Enhancement for Dynamic Authentication in Wireless Sensor Networks, in: Second International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Liverpool, 28-30 July 2010, pp. 143-146.
-
(2010)
Second International Conference on Computational Intelligence
, pp. 143-146
-
-
Kiani, F.1
Dalkilic, G.2
-
42
-
-
77952326880
-
Improved robust user authentication scheme for wireless sensor networks
-
December
-
B. Vaidya, M. Chen, J.J.P.C. Rodrigues, Improved Robust User Authentication Scheme for Wireless Sensor Networks, Proceedings of 5th IEEE International Conference on Wireless Communication and Sensor Networks (WCSN), December 2009, pp. 1-6.
-
(2009)
Proceedings of 5th IEEE International Conference on Wireless Communication and Sensor Networks (WCSN)
, pp. 1-6
-
-
Vaidya, B.1
Chen, M.2
Rodrigues, J.J.P.C.3
-
45
-
-
84867049459
-
A user authentication-based probabilistic risk approach for wireless sensor networks
-
Y. Faye, I. Niang, H. Guyennet, A User Authentication-based Probabilistic Risk Approach for Wireless Sensor Networks, International Workshop on Mobile Ad-Hoc Wireless Networks, 2012, pp. 124-129.
-
(2012)
International Workshop on Mobile Ad-Hoc Wireless Networks
, pp. 124-129
-
-
Faye, Y.1
Niang, I.2
Guyennet, H.3
-
49
-
-
84862773089
-
Improvement of das's two-factor authentication protocol in wireless sensor networks
-
D. Nyang, M. Lee, Improvement of Das's Two-factor Authentication Protocol in Wireless Sensor Networks, Cryptology ePrint Archive 2009/631, < http://eprint.iacr.org/2009/631.pdf >.
-
(2009)
Cryptology EPrint Archive
, pp. 631
-
-
Nyang, D.1
Lee, M.2
-
50
-
-
78650442232
-
Enhancement of two-factor user authentication in wireless sensor networks
-
October
-
H.F. Huang, Y.F. Chang, C.H. Liu, Enhancement of Two-factor User Authentication in Wireless Sensor Networks, in: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'10), October 2010, pp. 27-30.
-
(2010)
Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'10)
, pp. 27-30
-
-
Huang, H.F.1
Chang, Y.F.2
Liu, C.H.3
-
51
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
T.H. Chen, and W.K. Shih A robust mutual authentication protocol for wireless sensor networks ETRI J. 32 5 2010 704 712
-
(2010)
ETRI J
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
52
-
-
77955495427
-
Cryptanalysis and security improvements of Two-factor User Authentication in Wireless Sensor Networks
-
M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of Two-factor User Authentication in Wireless Sensor Networks Sensors 10 3 2010 2450 2459
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
53
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks
-
B. Vaidya, D. Makrakis, H.T. Mouftah, Improved two-factor user authentication in wireless sensor networks, in: IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2010, pp. 600-606.
-
(2010)
IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
, pp. 600-606
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
54
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sensor Wireless Networks 2010 1 11
-
(2010)
Ad Hoc Sensor Wireless Networks
, pp. 1-11
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
57
-
-
79958799640
-
Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks
-
Z. Tan Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks Adv. Inform. Sci. Service Sci. 3 4 2011 117 126
-
(2011)
Adv. Inform. Sci. Service Sci
, vol.3
, Issue.4
, pp. 117-126
-
-
Tan, Z.1
-
58
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
S.G. Yoo, K.Y. Park, and J. Kim A security-performance-balanced user authentication scheme for wireless sensor networks Int. J. Distrib. Sens. Netw. 2012 2012 1 11
-
(2012)
Int. J. Distrib. Sens. Netw
, vol.2012
, pp. 1-11
-
-
Yoo, S.G.1
Park, K.Y.2
Kim, J.3
-
59
-
-
77956388579
-
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
-
B. Vaidya, J.J. Rodrigues, and J.H. Park User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Int. J. Commun. Syst. 23 2010 1201 1222
-
(2010)
Int. J. Commun. Syst
, vol.23
, pp. 1201-1222
-
-
Vaidya, B.1
Rodrigues, J.J.2
Park, J.H.3
-
61
-
-
84961312004
-
Two-factor mutual authentication with key agreement in wireless sensor networks
-
B. Vaidya, D. Makrakis, and H. Mouftah Two-factor mutual authentication with key agreement in wireless sensor networks Secur. Commun. Networks 2012 10.1002/sec.517
-
(2012)
Secur. Commun. Networks
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.3
-
63
-
-
84939573910
-
-
CRYPTO'99
-
P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, Proceedings of Advances in Cryptology, CRYPTO'99, 1999, pp. 388-397.
-
(1999)
Differential Power Analysis, Proceedings of Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
64
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comput. 51 5 2002 541 552
-
(2002)
IEEE Trans. Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
65
-
-
68349130174
-
Attacking smart card systems: Theory and practice
-
K. Markantonakis, M. Tunstall, G.P. Hancke, I. Askoxylakis, and K.E. Mayes Attacking smart card systems: theory and practice Inform. Secur. Tech. Report 14 2 2009 46 56
-
(2009)
Inform. Secur. Tech. Report
, vol.14
, Issue.2
, pp. 46-56
-
-
Markantonakis, K.1
Tunstall, M.2
Hancke, G.P.3
Askoxylakis, I.4
Mayes, K.E.5
-
66
-
-
84958769993
-
Side channel cryptanalysis of product ciphers
-
Springer-Verlag, Berlin, Germany, LNCS, 1485
-
J. Kelsey, B. Schneier, D. Wagner, C. Hall, Side Channel Cryptanalysis of Product Ciphers, in: Proceedings of 5th European Symposium on Research in Computer Security-ESORICS' 98, Springer-Verlag, Berlin, Germany, LNCS, 1485, 1998, pp. 97-110.
-
(1998)
Proceedings of 5th European Symposium on Research in Computer Security-ESORICS' 98
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
68
-
-
70349308780
-
Analysis of security threats, requirements
-
LNCS, vol. [57] 05
-
J. Lopez, R. Roman, C. Alcaraz, Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks, Foundations of Security Analysis and Design V, LNCS, vol. [57] 05, 2009, pp. 289-338.
-
(2009)
Technologies and Standards in Wireless Sensor Networks, Foundations of Security Analysis and Design v
, pp. 289-338
-
-
Lopez, J.1
Roman, R.2
Alcaraz, C.3
-
69
-
-
84945119254
-
Entity authentication and key distribution
-
Berlin, Germany, LNCS 773
-
M. Bellare, P. Rogaway, Entity Authentication and Key Distribution, in: Proceedings of 13th Annual International Cryptology Conference: Advances in Cryptology-CRYPTO'93, Springer-Verlag, Berlin, Germany, LNCS 773, 1994, pp. 232-249.
-
(1994)
Proceedings of 13th Annual International Cryptology Conference: Advances in Cryptology-CRYPTO'93, Springer-Verlag
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
|