|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 33 occurrences of 23 keywords
|
|
|
Results
Found 25 publication records. Showing 25 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
46 | Seyit Ahmet Çamtepe, Bülent Yener |
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Seyit Ahmet Çamtepe, Bülent Yener |
Combinatorial design of key distribution mechanisms for wireless sensor networks. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
combinatorial design theory, generalized quadrangles (GQ), key pre-distribution (deterministic and hybrid), key-chains, security in wireless sensor networks (WSN), symmetric balanced incomplete block design (BIBD), key management |
29 | André Weimerskirch, Dirk Westhoff |
Zero Common-Knowledge Authentication for Pervasive Networks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Key-Chains, Ad-hoc Networks, Authentication, Public-Key, Symmetric Ciphers, Pervasive Networks |
28 | Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo |
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw |
A Certified Email Protocol Using Key Chains. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou |
Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks. |
Int. J. Distributed Sens. Networks |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay |
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
session key distribution, sensor network, computational security, self-healing, revocation |
19 | Firdous Kausar, Sajid Hussain, Laurence Tianruo Yang, Ashraf Masood |
Scalable and efficient key management for heterogeneous sensor networks. |
J. Supercomput. |
2008 |
DBLP DOI BibTeX RDF |
Random key predistribution, Security, Authentication, Key management, Heterogeneous sensor networks |
19 | Sajid Hussain, Firdous Kausar, Ashraf Masood |
An efficient key distribution scheme for heterogeneous sensor networks. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
security, key distribution, heterogeneous sensor networks, random key pre-distribution |
19 | André Weimerskirch, Dirk Westhoff |
Identity certified authentication for ad-hoc networks. |
SASN |
2003 |
DBLP DOI BibTeX RDF |
key-chains, security, ad-hoc networks, authentication, identification |
18 | Pan Wang, Peng Ning, Douglas S. Reeves |
Storage-Efficient Stateless Group Key Revocation. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia |
LEAP: efficient security mechanisms for large-scale distributed sensor networks. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
sensor networks, key management, in-network processing, security mechanism |
14 | John Preuß Mattsson |
Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
14 | Acee Lindem, Yingzhen Qu, Derek M. Yeung, Ing-Wher Chen, Jeffrey Zhang 0001 |
YANG Data Model for Key Chains. |
RFC |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Gianluca Caparra, Silvia Sturaro, Nicola Laurenti, Christian Wullems |
Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes. |
ICL-GNSS |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Seonho Choi, Kun Sun, Hyeonsang Eom, Edward Jung |
Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
14 | Yi-Li Huang, Fang-Yie Leu, Ilsun You, Yao-Kuo Sun, William Cheng-Chung Chu |
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment. |
J. Supercomput. |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Sujun Li, Boqing Zhou, Jingguo Dai, Xingming Sun |
A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks. |
IEEE Wirel. Commun. Lett. |
2012 |
DBLP DOI BibTeX RDF |
|
14 | Hailun Tan, John Zic, Sanjay K. Jha, Diethelm Ostry |
Secure Multihop Network Programming with Multiple One-Way Key Chains. |
IEEE Trans. Mob. Comput. |
2011 |
DBLP DOI BibTeX RDF |
|
14 | Hailun Tan, Sanjay K. Jha, Diethelm Ostry, John Zic, Vijay Sivaraman |
Secure multi-hop network programming with multiple one-way key chains. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
network programming protocols, sensor network security, broadcast authentication, code distribution |
13 | Sajid Hussain, Md. Shafayat Rahman, Laurence Tianruo Yang |
Key Predistribution Scheme using Keyed Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh |
An efficient broadcast authentication scheme in wireless sensor networks. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
key renewal, wireless sensor networks, authentication, broadcast, one time signature |
9 | Mohammad Al-Shurman, Seong-Moo Yoo |
Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning |
Defending against Sybil Attacks in Sensor Networks. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
7 | Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan |
Castor: Secure Code Updates Using Symmetric Cryptosystems. |
RTSS |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #25 of 25 (100 per page; Change: )
|
|