A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
A new approach for establishing pairwise keys for securing wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Coordinated sensor deployment for improving secure communications and sensing coverage
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Kansei: a testbed for sensing at scale
Proceedings of the 5th international conference on Information processing in sensor networks
Kansei: A High-Fidelity Sensing Testbed
IEEE Internet Computing
The Strange Logic of Random Graphs
The Strange Logic of Random Graphs
Hi-index | 0.00 |
First Page of the Article