Key distribution techniques for sensor networks
暂无分享,去创建一个
Dawn Song | Adrian Perrig | Haowen Chan | D. Song | A. Perrig | Haowen Chan
[1] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[2] Rolf Blom,et al. Non-Public Key Distribution , 1982, CRYPTO.
[3] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[4] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[5] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[6] Kaoru Kurosawa,et al. On Key Distribution and Authentication in Mobile Radio Networks , 1994, EUROCRYPT.
[7] Silvio Micali,et al. Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.
[8] M. Beller,et al. Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .
[9] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[10] Silvio Micali,et al. Secret-key agreement without public-key , 1994, CRYPTO 1994.
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] Colin Boyd,et al. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.
[13] Jessica Staddon,et al. Combinatorial Bounds for Broadcast Encryption , 1998, EUROCRYPT.
[14] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[15] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[16] Avishai Wool,et al. Long-Lived Broadcast Encryption , 2000, CRYPTO.
[17] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[18] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[19] Duncan S. Wong,et al. Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices , 2001, ASIACRYPT.
[20] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[21] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[22] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[23] Kevin Driscoll,et al. Making Home Automation Communications Secure , 2001, Computer.
[24] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[25] Matthew K. Franklin,et al. Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[26] Sencun Zhu,et al. LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.
[27] Ramesh Govindan,et al. Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.
[28] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[29] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[30] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[31] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..