The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase key-chains (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2008 (16) 2009-2024 (9)
Publication types (Num. hits)
article(10) inproceedings(15)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 33 occurrences of 23 keywords

Results
Found 25 publication records. Showing 25 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
46Seyit Ahmet Çamtepe, Bülent Yener Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Seyit Ahmet Çamtepe, Bülent Yener Combinatorial design of key distribution mechanisms for wireless sensor networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF combinatorial design theory, generalized quadrangles (GQ), key pre-distribution (deterministic and hybrid), key-chains, security in wireless sensor networks (WSN), symmetric balanced incomplete block design (BIBD), key management
29André Weimerskirch, Dirk Westhoff Zero Common-Knowledge Authentication for Pervasive Networks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key-Chains, Ad-hoc Networks, Authentication, Public-Key, Symmetric Ciphers, Pervasive Networks
28Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw A Certified Email Protocol Using Key Chains. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF session key distribution, sensor network, computational security, self-healing, revocation
19Firdous Kausar, Sajid Hussain, Laurence Tianruo Yang, Ashraf Masood Scalable and efficient key management for heterogeneous sensor networks. Search on Bibsonomy J. Supercomput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random key predistribution, Security, Authentication, Key management, Heterogeneous sensor networks
19Sajid Hussain, Firdous Kausar, Ashraf Masood An efficient key distribution scheme for heterogeneous sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, key distribution, heterogeneous sensor networks, random key pre-distribution
19André Weimerskirch, Dirk Westhoff Identity certified authentication for ad-hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF key-chains, security, ad-hoc networks, authentication, identification
18Pan Wang, Peng Ning, Douglas S. Reeves Storage-Efficient Stateless Group Key Revocation. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Sencun Zhu, Sanjeev Setia, Sushil Jajodia LEAP: efficient security mechanisms for large-scale distributed sensor networks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sensor networks, key management, in-network processing, security mechanism
14John Preuß Mattsson Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
14Acee Lindem, Yingzhen Qu, Derek M. Yeung, Ing-Wher Chen, Jeffrey Zhang 0001 YANG Data Model for Key Chains. Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Gianluca Caparra, Silvia Sturaro, Nicola Laurenti, Christian Wullems Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes. Search on Bibsonomy ICL-GNSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Seonho Choi, Kun Sun, Hyeonsang Eom, Edward Jung Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yao-Kuo Sun, William Cheng-Chung Chu A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment. Search on Bibsonomy J. Supercomput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Sujun Li, Boqing Zhou, Jingguo Dai, Xingming Sun A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14Hailun Tan, John Zic, Sanjay K. Jha, Diethelm Ostry Secure Multihop Network Programming with Multiple One-Way Key Chains. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
14Hailun Tan, Sanjay K. Jha, Diethelm Ostry, John Zic, Vijay Sivaraman Secure multi-hop network programming with multiple one-way key chains. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network programming protocols, sensor network security, broadcast authentication, code distribution
13Sajid Hussain, Md. Shafayat Rahman, Laurence Tianruo Yang Key Predistribution Scheme using Keyed Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh An efficient broadcast authentication scheme in wireless sensor networks. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key renewal, wireless sensor networks, authentication, broadcast, one time signature
9Mohammad Al-Shurman, Seong-Moo Yoo Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Defending against Sybil Attacks in Sensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
7Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan Castor: Secure Code Updates Using Symmetric Cryptosystems. Search on Bibsonomy RTSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #25 of 25 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license