Cryptography Reference
In-Depth Information
Bellare, M., and P. Rogaway. Random oracle models are practical: A paradigm for designing
efficient protocols. Proceedings of the 1st ACM Conference on Computer and Communications
Security (CCS'93). ACM, 1993, 62-73.
Blom, R. An optimal class of symmetric key generation systems. Advances in Cryptology:
Proceedings of Eurocrypt '84 , 1984, 335-338.
Blundo, C., A. D. Santis, A. Herzberg, and S. Kutten. Perfectly-secure key distribution for
dynamic conferences. Advances in Cryptology - Crypto '92 (Berlin: Springer-Verlag), 1992,
471- 486.
Boneh, D., and M. Franklin. Identity-based encryption from the Weil pairing. Lecture Notes in
Computer Science (Springer-Verlag) 2139 (2001): 213-229.
Camtepe, S., and B. Yener. Combinatorial design of key distribution mechanisms for wireless
sensor networks. IEEE Transactions on Networking (IEEE) 15, no. 2 (2007): 346-358.
Chan, H., Perrig, A., and D. Song. Random key pre-distribution schemes for sensor networks.
Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE, 2003, 197-213.
Du, W., J. Deng, Y. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless
sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications
Security (CCS 2003). ACM, 2003, 42-51.
Eschenauer, L., and V. D. Gligor. A key management scheme for distributed sensor networks.
Proceedings of the 9th ACM Conference on Computer and Communication Security. ACM, 2002.
Gemmell, P. An introduction to threshold cryptography. CryptoBytes, a technical newsletter of
RSA Laboratories 2, no. 7 (1997): 7-11.
Joux A. A one round protocol for tripartite Diffie-Hellman. Proceedings of Algorithmic Number
Theory Symposium - ANTS IV , Lecture Notes in Computer Science (Springer-Verlag) 1838
(2000): 385-394.
Lee, J., and D. Stinson. Deterministic key predistribution schemes for distributed sensor net-
works. Lecture Notes in Computer Science (Springer-Verlag) 3357 (2005): 294-307.
Liu, D., and P. Ning. Establishing pairwise keys in distributed sensor networks. Proceedings of
the 10th ACM Conference on Computer and Communications Security (CCS 2003). ACM,
2003, 52-61.
Lynn, B. Authenticated identity-based encryption. Cryptology ePrint Archive -2002/072, 2002
Matsumoto, T., and H. Imai. On the key predistribution system: A practical solution to the
key distribution problem. CRYPTO '87 A Conference on the Theory and Applications of
Cryptographic Techniques on Advances in Cryptology . Springer-Verlag, 1988, 185-193.
Merkle, R. Protocols for public key cryptosystems. Proceedings of the IEEE Symposium on
Research in Security and Privacy. IEEE, 1980, 122-134.
Perrig, A., R. Szewczyk, J. Tygar, V. Wen, and D. Culler. SPINS: Security protocols for sensor.
Wireless Networks 8, no. 5 (2002): 521-534.
Sakai R., K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. 2000 Symposium on
Cryptography and Information Security - SCIS'2000 . Okinawa, Japan, January 2000.
Shamir, A. Identity-based cryptosystems and signature schemes. Advances in Cryptology:
Proceedings of CRYPTO 84, Lecture Notes in Computer Science (Springer-Verlag) 196 (1984):
47-53.
Search WWH ::




Custom Search