SPINS: Security protocols for sensor networks

From MaRDI portal
Publication:1859201


DOI10.1023/A:1016598314198zbMath1030.68814MaRDI QIDQ1859201

J. D. Tygar, Robert Szewczyk, Victor Wen, David E. Culler, Adrian Perrig

Publication date: 17 February 2003

Published in: Wireless Networks (Search for Journal in Brave)


68M10: Network design and communication in computer systems

94A60: Cryptography

68U99: Computing methodologies and applications

68M20: Performance evaluation, queueing, and scheduling in the context of computer systems

94A62: Authentication, digital signatures and secret sharing


Related Items

ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks, Security and Trust in Sensor Networks, Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks, SPINS, On optimal cryptographic key derivation, HORSIC: an efficient one-time signature scheme for wireless sensor networks, Modeling and verifying ad hoc routing protocols, Quantum security in wireless sensor networks, Secure and highly-available aggregation queries in large-scale sensor networks via set sampling, Chaos block cipher for wireless sensor network, CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks, Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks, Formal models and analysis of secure multicast in wired and wireless networks, A survey on position-based routing algorithms in wireless sensor networks, A new protocol for the detection of node replication attacks in mobile wireless sensor networks, Step-size sequence design for finite-time average consensus in secure wireless sensor networks, Rijndael for Sensor Networks: Is Speed the Main Issue?, Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks, Unnamed Item, A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS, A power efficient aggregation of encrypted data in wireless sensor network, An efficient key management protocol for wireless sensor networks, Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks, Quantum Wireless Sensor Networks, A Distributed Data Storage Scheme for Sensor Networks, Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games