SPINS: security protocols for sensor networks
Wireless Networks
Accelerating Key Establishment Protocols for Mobile Communication
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Password-Authenticated Key Exchange between Clients with Different Passwords
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Security protocols for 2G and 3G wireless communications
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Key distribution techniques for sensor networks
Wireless sensor networks
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
An improved end-to-end secure authentication scheme for CDMA networks
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
An authentication protocol for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Identity-based key agreement with unilateral identity privacy using pairings
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
N-Party encrypted diffie-hellman key exchange using different passwords
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
Hexagonal groups based key management using deployment knowledge in wireless sensor networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Secure data transmission with cloud computing in heterogeneous wireless networks
Security and Communication Networks
Hi-index | 0.02 |