-
1
-
-
0001989185
-
A new family of authentication protocols
-
Anderson, R., Bergadano, F., Crispo, B., Lee, J., Manifavas, C., Needham, R., 1998. A new family of authentication protocols. In Operating Systems Review.
-
(1998)
Operating Systems Review.
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.4
Manifavas, C.5
Needham, R.6
-
2
-
-
0035789267
-
Secure pebblenets
-
Basagni, S., Herrin, K., Bruschi, D., Rosti, E., 2001. Secure pebblenets. In Proceedings of ACM International Symposium on Mobile ad hoc networking and computing. 156-163.
-
(2001)
Proceedings of ACM International Symposium on Mobile ad hoc networking and computing.
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
4
-
-
33744722595
-
FLAMeS: Fast, loss-tolerant authentication of multicast stream. Tech
-
rep., BT Research
-
Briscoe, B., 2000. FLAMeS: Fast, loss-tolerant authentication of multicast stream. Tech. rep., BT Research.
-
(2000)
-
-
Briscoe, B.1
-
5
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B., 1999. Multicast security: A taxonomy and some efficient constructions. In Proceedings of IEEE INFOCOM '99. 708-716.
-
(1999)
Proceedings of IEEE INFOCOM '99.
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
4544365398
-
Constrains and approaches for distributed sensor network security
-
Tech. rep., NAI Labs
-
Carman, D., Kruus, P., Matt, B. J., 2000. Constrains and approaches for distributed sensor network security. Tech. rep., NAI Labs.
-
(2000)
-
-
Carman, D.1
Kruus, P.2
Matt, B.J.3
-
7
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Chan, H., Perrig, A., Song, D., 2003. Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy. 197-213.
-
(2003)
IEEE Symposium on Research in Security and Privacy.
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
San Diego, California
-
Cheung, S., 1997. An efficient message authentication scheme for link state routing. In 13th Annual Computer Security Applications conference. San Diego, California.
-
(1997)
13th Annual Computer Security Applications conference.
-
-
Cheung, S.1
-
9
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Du, W., Deng, J., Han, Y. S., Chen, S., Varshney, P., 2004. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE INFOCOM '04 (to appear).
-
(2004)
IEEE INFOCOM '04 (to appear).
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
10
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du, W., Deng, J., Han, Y. S., Varshney, P., 2003. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03). 42-51.
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03).
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
12
-
-
17844362127
-
How to sign digital streams. Tech
-
rep., IBM T.J. Watson Research Center
-
Gennaro, R., Rohatgi, P., 1997. How to sign digital streams. Tech. rep., IBM T.J. Watson Research Center.
-
(1997)
-
-
Gennaro, R.1
Rohatgi, P.2
-
13
-
-
0022793132
-
How to construct random functions
-
October
-
Goldreich, O., Goldwasser, S., Micali, S., 1986. How to construct random functions. J. ACM 33, 4 (October), 792-807.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
15
-
-
0034445661
-
System architecture directions for networked sensors
-
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K. S. J., 2000. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems. 93-104.
-
(2000)
Architectural Support for Programming Languages and Operating Systems.
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.S.J.6
-
17
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
IETF RFC 2104
-
Krawczyk, H., Bellare, M., Canetti, R., 1997. HMAC: Keyed-hashing for message authentication. IETF RFC 2104.
-
(1997)
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
18
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L., 1981. Password authentication with insecure communication. Commun. ACM 24, 11, 770-772.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
23
-
-
33746530387
-
TESLA: Multicast source authentication transform
-
IRTF draft, draft-irtf-smug-tesla-00.txt
-
Perrig, A., Canetti, R., Briscoe Tygar, J., and Song, D. 2000a. TESLA: Multicast source authentication transform. IRTF draft, draft-irtf-smug-tesla-00.txt.
-
(2000)
-
-
Perrig, A.1
Canetti, R.2
Briscoe Tygar, J.3
Song, D.4
-
24
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Perrig, A., Canetti, R., Song, D., Tygar, D., 2000b. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the 2000 IEEE Symposium on Security and Privacy.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy.
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
25
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Perrig, A., Canetti, R., Song, D., Tygar, D., 2001a. Efficient and secure source authentication for multicast. In Proceedings of Network and Distributed System Security Symposium.
-
(2001)
Proceedings of Network and Distributed System Security Symposium.
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
26
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D., 2001b. SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks.
-
(2001)
Proceedings of Seventh Annual International Conference on Mobile Computing and Networks.
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L., 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2, 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
31
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A. D. and Stankovic, J. A. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10, 54-62.
-
(2002)
IEEE Comput.
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
32
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S., Setia, S., Jajodia, S., 2003. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03). 62-72.
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03).
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|