Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Linear Key Predistribution Schemes
Designs, Codes and Cryptography
Mechanising a Protocol for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Lack of Explicitness Strikes Back
Revised Papers from the 8th International Workshop on Security Protocols
Inductive verification of smart card protocols
Journal of Computer Security
Linear broadcast encryption schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Key distribution techniques for sensor networks
Wireless sensor networks
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Information and System Security (TISSEC)
Secure collaborations over message boards
International Journal of Security and Networks
A pairwise key establishment scheme for heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Tree-based key predistribution for wireless sensor networks
Wireless Networks
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Self-configurable key pre-distribution in mobile ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Tree-Based key distribution patterns
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Hi-index | 0.00 |