Cryptography Reference
In-Depth Information
Bellare, M., and P. Rogaway. Random oracle models are practical: A paradigm for designing
efficient protocols.
Proceedings
of
the
1st
ACM
Conference
on
Computer
and
Communications
Security
(CCS'93).
ACM, 1993, 62-73.
Blom, R. An optimal class of symmetric key generation systems.
Advances
in
Cryptology:
Proceedings
of
Eurocrypt
'84
, 1984, 335-338.
Blundo, C., A. D. Santis, A. Herzberg, and S. Kutten. Perfectly-secure key distribution for
dynamic conferences.
Advances
in
Cryptology
-
Crypto
'92
(Berlin: Springer-Verlag), 1992,
471- 486.
Boneh, D., and M. Franklin. Identity-based encryption from the Weil pairing.
Lecture
Notes
in
Computer
Science
(Springer-Verlag) 2139 (2001): 213-229.
Camtepe, S., and B. Yener. Combinatorial design of key distribution mechanisms for wireless
sensor networks.
IEEE
Transactions
on
Networking
(IEEE) 15, no. 2 (2007): 346-358.
Chan, H., Perrig, A., and D. Song. Random key pre-distribution schemes for sensor networks.
Proceedings
of
the
2003
IEEE
Symposium
on
Security
and
Privacy.
IEEE, 2003, 197-213.
Du, W., J. Deng, Y. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless
sensor networks.
Proceedings
of
the
10th
ACM
Conference
on
Computer
and
Communications
Security
(CCS
2003).
ACM, 2003, 42-51.
Eschenauer, L., and V. D. Gligor. A key management scheme for distributed sensor networks.
Proceedings
of
the
9th
ACM
Conference
on
Computer
and
Communication
Security.
ACM, 2002.
Gemmell, P. An introduction to threshold cryptography.
CryptoBytes,
a
technical
newsletter
of
RSA
Laboratories
2, no. 7 (1997): 7-11.
Joux A. A one round protocol for tripartite Diffie-Hellman.
Proceedings
of
Algorithmic
Number
Theory
Symposium
-
ANTS
IV
,
Lecture
Notes
in
Computer
Science
(Springer-Verlag) 1838
(2000): 385-394.
Lee, J., and D. Stinson. Deterministic key predistribution schemes for distributed sensor net-
works.
Lecture
Notes
in
Computer
Science
(Springer-Verlag) 3357 (2005): 294-307.
Liu, D., and P. Ning. Establishing pairwise keys in distributed sensor networks.
Proceedings
of
the
10th
ACM
Conference
on
Computer
and
Communications
Security
(CCS
2003).
ACM,
2003, 52-61.
Lynn, B. Authenticated identity-based encryption.
Cryptology
ePrint
Archive
-2002/072, 2002
Matsumoto, T., and H. Imai. On the key predistribution system: A practical solution to the
key distribution problem.
CRYPTO '87 A Conference on the Theory and Applications of
Cryptographic Techniques on Advances in Cryptology
. Springer-Verlag, 1988, 185-193.
Merkle, R. Protocols for public key cryptosystems.
Proceedings
of
the
IEEE
Symposium
on
Research
in
Security
and
Privacy.
IEEE, 1980, 122-134.
Perrig, A., R. Szewczyk, J. Tygar, V. Wen, and D. Culler. SPINS: Security protocols for sensor.
Wireless
Networks
8, no. 5 (2002): 521-534.
Sakai R., K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing.
2000
Symposium
on
Cryptography
and
Information
Security
-
SCIS'2000
. Okinawa, Japan, January 2000.
Shamir, A. Identity-based cryptosystems and signature schemes.
Advances
in
Cryptology:
Proceedings
of
CRYPTO
84,
Lecture
Notes
in
Computer
Science
(Springer-Verlag) 196 (1984):
47-53.
Search WWH ::
Custom Search