-
1
-
-
84893603167
-
Energy-efficient, secure group key agreement for ad hoc networks
-
Washington, DC, USA, Oct.
-
T. R. Halford, T. A. Courtade, and K. M. Chugg, "Energy-efficient, secure group key agreement for ad hoc networks," in Proc. IEEE Commun. Netw. Security Conf., Washington, DC, USA, Oct. 2013, pp. 181-188.
-
(2013)
Proc. IEEE Commun. Netw. Security Conf.
, pp. 181-188
-
-
Halford, T.R.1
Courtade, T.A.2
Chugg, K.M.3
-
2
-
-
36849063206
-
Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks
-
Oct.
-
P. Sakarindr and N. Ansari, "Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 8-20, Oct. 2007.
-
(2007)
IEEE Wireless Commun.
, vol.14
, Issue.5
, pp. 8-20
-
-
Sakarindr, P.1
Ansari, N.2
-
3
-
-
66149101016
-
Secure and efficient multicast in wireless sensor networks allowing ad hoc group formation
-
May
-
K. Ren, W. Lou, B. Zhu, and S. Jajodia, "Secure and efficient multicast in wireless sensor networks allowing ad hoc group formation," IEEE Trans. Veh. Technol., vol. 58, no. 4, pp. 2018-2029, May 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.4
, pp. 2018-2029
-
-
Ren, K.1
Lou, W.2
Zhu, B.3
Jajodia, S.4
-
4
-
-
84897708272
-
Secure many-to-some communications
-
San Diego, CA, USA, Nov.
-
T. R. Halford, "Secure many-to-some communications," in Proc. IEEE Mil. Commyn. Conf., San Diego, CA, USA, Nov. 2013, pp. 243-247.
-
(2013)
Proc. IEEE Mil. Commyn. Conf.
, pp. 243-247
-
-
Halford, T.R.1
-
5
-
-
51649129069
-
Lowcost implementation of NTRU for pervasive security
-
Leuven, Belgium, Jul.
-
A. C. Atici, L. Batina, J. Fan, I. Verbauwhede, and S. B. Ors, "Lowcost implementation of NTRU for pervasive security," in Proc. Int. Conf. Appl.-Spec. Syst., Architect. Process., Leuven, Belgium, Jul. 2008, pp. 79-84.
-
(2008)
Proc. Int. Conf. Appl.-Spec. Syst., Architect. Process.
, pp. 79-84
-
-
Atici, A.C.1
Batina, L.2
Fan, J.3
Verbauwhede, I.4
Ors, S.B.5
-
6
-
-
0033894011
-
On the construction of energy-efficient broadcast and multicast trees in wireless networks
-
Tel Aviv, Israel, Mar.
-
J. E.Wieselthier, G. D. Nguyen, and A. Ephremides, "On the construction of energy-efficient broadcast and multicast trees in wireless networks," in Proc. IEEE Conf. Comput. Commun., Tel Aviv, Israel, Mar. 2000, pp. 585-594.
-
(2000)
Proc. IEEE Conf. Comput. Commun.
, pp. 585-594
-
-
Wieselthier, J.E.1
Nguyen, G.D.2
Ephremides, A.3
-
7
-
-
0034247455
-
Key agreement in dynamic peer groups
-
Aug.
-
M. Steiner, G. Tsudik, and M. Waidner, "Key agreement in dynamic peer groups," IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769-780, Aug. 2000.
-
(2000)
IEEE Trans. Parallel Distrib. Syst.
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
8
-
-
3042583499
-
Secure group communication using robust contributory key agreement
-
May
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. L. Schultz, and G. Tsudik, "Secure group communication using robust contributory key agreement," IEEE Trans. Parallel Distrib. Syst., vol. 15, no. 5, pp. 468-480, May 2004.
-
(2004)
IEEE Trans. Parallel Distrib. Syst.
, vol.15
, Issue.5
, pp. 468-480
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.L.4
Tsudik, G.5
-
9
-
-
79953328490
-
Flexible robust group key agreement
-
May
-
S. Jarecki, J. Kim, and G. Tsudik, "Flexible robust group key agreement," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 879-886, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 879-886
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
11
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
12
-
-
0000288916
-
A secure and efficient conference key distribution system
-
Berlin, Germany: Springer-Verlag, ser. Lecture Notes in Computer Science
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," in Advances in Cryptology - EUROCRYPT, vol. 950. Berlin, Germany: Springer-Verlag, 1995, pp. 275-286, ser. Lecture Notes in Computer Science.
-
(1995)
Advances in Cryptology - EUROCRYPT
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
13
-
-
84861147805
-
ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing
-
Jul./Aug.
-
J.-W. Ho, M. Wright, and S. K. Das, "ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing," IEEE Trans. Dependable Secure Comput., vol. 9, no. 4, pp. 494-511, Jul./Aug. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.4
, pp. 494-511
-
-
Ho, J.-W.1
Wright, M.2
Das, S.K.3
-
14
-
-
84893441364
-
Coded cooperative data exchange in multihop networks
-
Feb.
-
T. A. Courtade and R. D. Wesel, "Coded cooperative data exchange in multihop networks," IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 1136-1158, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.2
, pp. 1136-1158
-
-
Courtade, T.A.1
Wesel, R.D.2
-
15
-
-
84906536511
-
Coded cooperative data exchange for a secrect key
-
Honolulu, HI, USA, Jul.
-
T. A. Courtade and T. R. Halford, "Coded cooperative data exchange for a secrect key," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jul. 2014, pp. 776-780.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 776-780
-
-
Courtade, T.A.1
Halford, T.R.2
-
16
-
-
84908655314
-
Group key management protocols for secure mobile multicast communication: A comprehensive survey
-
Dec.
-
T. T. Mapoka, "Group key management protocols for secure mobile multicast communication: A comprehensive survey," Int. J. Comput. Appl., vol. 84, no. 12, pp. 28-38, Dec. 2013.
-
(2013)
Int. J. Comput. Appl.
, vol.84
, Issue.12
, pp. 28-38
-
-
Mapoka, T.T.1
-
17
-
-
32444434566
-
An efficient group key agreement protocol
-
Feb.
-
B. E. Jung, "An efficient group key agreement protocol," IEEE Commun. Lett., vol. 10, no. 2, pp. 106-107, Feb. 2006.
-
(2006)
IEEE Commun. Lett.
, vol.10
, Issue.2
, pp. 106-107
-
-
Jung, B.E.1
-
18
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
19
-
-
83655191085
-
Linear perfect secret key agreement
-
Paraty, Brazil, Oct.
-
C. Chan, "Linear perfect secret key agreement," in Proc. IEEE Inf. Theory Workshop, Paraty, Brazil, Oct. 2011, pp. 723-726.
-
(2011)
Proc. IEEE Inf. Theory Workshop
, pp. 723-726
-
-
Chan, C.1
-
20
-
-
84906536499
-
On the communication complexity of secret key generation in the multiterminal source model
-
Honolulu, HI, USA, Jul.
-
M. Mukherjee and N. Kashyap, "On the communication complexity of secret key generation in the multiterminal source model," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jul. 2014, pp. 1151-1155.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1151-1155
-
-
Mukherjee, M.1
Kashyap, N.2
-
21
-
-
78649383176
-
Perfect omniscience, perfect secrecy and Steiner tree packing
-
Dec.
-
S. Nitinawarat and P. Narayan, "Perfect omniscience, perfect secrecy and Steiner tree packing," IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6490-6500, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.12
, pp. 6490-6500
-
-
Nitinawarat, S.1
Narayan, P.2
-
22
-
-
84882989241
-
Common information and secret key capacity
-
Sep.
-
H. Tyagi, "Common information and secret key capacity," IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5627-5640, Sep. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5627-5640
-
-
Tyagi, H.1
-
23
-
-
78649346776
-
Secret key generation for a pairwise independent network model
-
Dec.
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, "Secret key generation for a pairwise independent network model," IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6482-6489, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.12
, pp. 6482-6489
-
-
Nitinawarat, S.1
Ye, C.2
Barg, A.3
Narayan, P.4
Reznik, A.5
-
24
-
-
84867537040
-
Fault-tolerant secret key generation
-
Cambridge, MA, USA, Jul.
-
H. Tyagi, N. Kashyap, Y. Sankarasubramaniam, and K. Viswanathan, "Fault-tolerant secret key generation," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 1787-1791.
-
(2012)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1787-1791
-
-
Tyagi, H.1
Kashyap, N.2
Sankarasubramaniam, Y.3
Viswanathan, K.4
-
25
-
-
0022793132
-
How to construct random functions
-
Oct.
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," J. ACM, vol. 33, no. 4, pp. 792-807, Oct. 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
26
-
-
77954832847
-
On coding for cooperative data exchange
-
Cairo, Egypt, Jan.
-
S. El Rouayheb, A. Sprintson, and P. Sadeghi, "On coding for cooperative data exchange," in Proc. IEEE Inf. Theory Workshop, Cairo, Egypt, Jan. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop
, pp. 1-5
-
-
El Rouayheb, S.1
Sprintson, A.2
Sadeghi, P.3
-
27
-
-
84867506651
-
Coded cooperative data exchange problem for general topologies
-
Cambridge, MA, USA, Jul.
-
M. Gonen and M. Langberg, "Coded cooperative data exchange problem for general topologies," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 2606-2610.
-
(2012)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2606-2610
-
-
Gonen, M.1
Langberg, M.2
-
28
-
-
84856078259
-
Weighted universal recovery, practical secrecy, and an efficient algorithm for solving both
-
Monticello, IL, USA, Sep.
-
T. A. Courtade and R. D. Wesel, "Weighted universal recovery, practical secrecy, and an efficient algorithm for solving both," in Proc. Allerton Conf. Commun., Control, Comput., Monticello, IL, USA, Sep. 2011, pp. 1349-1357.
-
(2011)
Proc. Allerton Conf. Commun., Control, Comput.
, pp. 1349-1357
-
-
Courtade, T.A.1
Wesel, R.D.2
-
29
-
-
0041663475
-
Opportunistic large arrays: Cooperative transmission in wireless multihop ad hoc networks to reach far distances
-
Aug.
-
A. Scaglione and Y.-W. Hong, "Opportunistic large arrays: Cooperative transmission in wireless multihop ad hoc networks to reach far distances," IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2082-2092, Aug. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.8
, pp. 2082-2092
-
-
Scaglione, A.1
Hong, Y.-W.2
-
30
-
-
77952677275
-
Barrage relay networks
-
San Diego, CA, USA, Feb.
-
T. R. Halford and K. M. Chugg, "Barrage relay networks," in Proc. Inf. Theory Appl. Workshop, San Diego, CA, USA, Feb. 2010, pp. 1-8.
-
(2010)
Proc. Inf. Theory Appl. Workshop
, pp. 1-8
-
-
Halford, T.R.1
Chugg, K.M.2
-
31
-
-
84873440135
-
Low-power wireless bus
-
Toronto, ON, Canada, Nov.
-
F. Ferrari, M. Zimmerling, L. Mottola, and L. Theile, "Low-power wireless bus," in Proc. ACM Conf. Embedded Netw. SenSys, Toronto, ON, Canada, Nov. 2012, pp. 1-14.
-
(2012)
Proc. ACM Conf. Embedded Netw. SenSys
, pp. 1-14
-
-
Ferrari, F.1
Zimmerling, M.2
Mottola, L.3
Theile, L.4
-
32
-
-
80054809782
-
Deterministic algorithm for the cooperative data exchange problem
-
St. Petersburg, Russia, Aug.
-
N. Milosavljevic, S. Pawar, S. El Rouayheb, M. Gastpar, and K. Ramchandran, "Deterministic algorithm for the cooperative data exchange problem," in Proc. IEEE Int. Symp. Inf. Theory, St. Petersburg, Russia, Aug. 2011, pp. 410-414.
-
(2011)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 410-414
-
-
Milosavljevic, N.1
Pawar, S.2
El Rouayheb, S.3
Gastpar, M.4
Ramchandran, K.5
-
33
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
Athens, Greece, Nov.
-
Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proc. ACM Conf. Comput. Commun. Security, Athens, Greece, Nov. 2000, pp. 235-244.
-
(2000)
Proc. ACM Conf. Comput. Commun. Security
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
35
-
-
84884861701
-
Pairwise and triple key distribution in wireless sensor networks with applications
-
Nov.
-
S. Ruj, A. Nayak, and I. Stojmenovic, "Pairwise and triple key distribution in wireless sensor networks with applications," IEEE Trans. Comput., vol. 62, no. 11, pp. 2224-2237, Nov. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.11
, pp. 2224-2237
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
36
-
-
15844381309
-
A probabilistic analysis of the set covering problem
-
C. Vercellis, "A probabilistic analysis of the set covering problem," Ann. Oper. Res., vol. 1, no. 3, pp. 255-271, 1984.
-
(1984)
Ann. Oper. Res.
, vol.1
, Issue.3
, pp. 255-271
-
-
Vercellis, C.1
-
37
-
-
15844399700
-
Absolute o(logm) error in approximating random set cover: An average case analysis
-
May
-
O. A. Telelis and V. Zissimopoulos, "Absolute o(logm) error in approximating random set cover: An average case analysis," Inf. Process. Lett., vol. 94, no. 4, pp. 171-177, May 2005.
-
(2005)
Inf. Process. Lett.
, vol.94
, Issue.4
, pp. 171-177
-
-
Telelis, O.A.1
Zissimopoulos, V.2
-
38
-
-
85030178366
-
Epidemic algorithms for replicated database maintenance
-
Vancouver, BC, Canada, Aug.
-
A. Demers et al., "Epidemic algorithms for replicated database maintenance," in Proc. ACM Symp. Principles Distrib. Comput., Vancouver, BC, Canada, Aug. 1987, pp. 1-12.
-
(1987)
Proc. ACM Symp. Principles Distrib. Comput.
, pp. 1-12
-
-
Demers, A.1
-
39
-
-
79951643202
-
A low complexity distributed algorithm for computing minimum-depth multicast trees in wireless networks
-
San Jose, CA, USA, Nov.
-
A. S. Akyurek and E. Uysal-Biyikoglu, "A low complexity distributed algorithm for computing minimum-depth multicast trees in wireless networks," in Proc. IEEE Mil. Commun. Conf., San Jose, CA, USA, Nov. 2010, pp. 1918-1923.
-
(2010)
Proc. IEEE Mil. Commun. Conf.
, pp. 1918-1923
-
-
Akyurek, A.S.1
Uysal-Biyikoglu, E.2
-
40
-
-
62749095223
-
-
Cambridge, MA, USA: MIT Press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. Cambridge, MA, USA: MIT Press, 2002.
-
(2002)
Introduction to Algorithms, 2nd Ed
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
41
-
-
0001553129
-
Critical power for asymptotic connectivity in wireless networks
-
Boston, MA, USA: Birkhaüser
-
P. Gupta and P. R. Kumar, "Critical power for asymptotic connectivity in wireless networks," in Stochastic Analysis, Control, Optimization and Applications. Boston, MA, USA: Birkhaüser, 1998, pp. 547-566.
-
(1998)
Stochastic Analysis, Control, Optimization and Applications
, pp. 547-566
-
-
Gupta, P.1
Kumar, P.R.2
-
42
-
-
56449087483
-
Energy conservation in wireless sensor networks: A survey
-
May
-
G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella, "Energy conservation in wireless sensor networks: A survey," Ad Hoc Netw., vol. 7, no. 3, pp. 537-568, May 2009.
-
(2009)
Ad Hoc Netw.
, vol.7
, Issue.3
, pp. 537-568
-
-
Anastasi, G.1
Conti, M.2
Di Francesco, M.3
Passarella, A.4
-
44
-
-
83355173279
-
A note on 'Algorithms for connected set cover problem and fault-tolerant connected set cover problem'
-
Oct.
-
W. Ren and Q. Zhao, "A note on 'Algorithms for connected set cover problem and fault-tolerant connected set cover problem'," Theor. Comput. Sci., vol. 412, no. 45, pp. 6451-6454, Oct. 2011.
-
(2011)
Theor. Comput. Sci.
, vol.412
, Issue.45
, pp. 6451-6454
-
-
Ren, W.1
Zhao, Q.2
|