Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks (English)
Free access
- New search for: Zhu, Wen Tao
- New search for: Deng, Robert H.
- New search for: Zhou, Jianying
- New search for: Bao, Feng
- New search for: Zhu, Wen Tao
- New search for: Deng, Robert H.
- New search for: Zhou, Jianying
- New search for: Bao, Feng
In:
Information and Communications Security
9
;
306-318
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks
-
Contributors:Zhu, Wen Tao ( author ) / Deng, Robert H. ( author ) / Zhou, Jianying ( author ) / Bao, Feng ( author )
-
Published in:Information and Communications Security , 9 ; 306-318Lecture Notes in Computer Science ; 7043, 9 ; 306-318
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Forward Secure Ring Signature without Random OraclesLiu, Joseph K. / Yuen, Tsz Hon / Zhou, Jianying et al. | 2011
- 15
-
Ring Signature Schemes from Lattice Basis DelegationWang, Jin / Sun, Bo et al. | 2011
- 29
-
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key CyclesLei, Xinfeng / Xue, Rui / Yu, Ting et al. | 2011
- 42
-
A Variant of Boyen-Waters Anonymous IBE SchemeLuo, Song / Shen, Qingni / Jin, Yongming / Chen, Yu / Chen, Zhong / Qing, Sihan et al. | 2011
- 57
-
Non-interactive Opening for Ciphertexts Encrypted by Shared KeysChen, Jiageng / Emura, Keita / Miyaji, Atsuko et al. | 2011
- 69
-
Lightweight RFID Mutual Authentication Protocol against Feasible ProblemsJin, Yongming / Sun, Huiping / Xin, Wei / Luo, Song / Chen, Zhong et al. | 2011
- 78
-
A Note on a Privacy-Preserving Distance-Bounding ProtocolAumasson, Jean-Philippe / Mitrokotsa, Aikaterini / Peris-Lopez, Pedro et al. | 2011
- 93
-
Delegable Provable Data Possession for Remote Data in the CloudsShen, Shiuan-Tzuo / Tzeng, Wen-Guey et al. | 2011
- 112
-
Unconditionally Secure Oblivious Transfer Based on Channel DelaysCheong, Kai-Yuen / Miyaji, Atsuko et al. | 2011
- 121
-
Preserving Security and Privacy in Large-Scale VANETsQin, Bo / Wu, Qianhong / Domingo-Ferrer, Josep / Zhang, Lei et al. | 2011
- 136
-
A Probabilistic Secret Sharing Scheme for a Compartmented Access StructureYu, Yuyin / Wang, Mingsheng et al. | 2011
- 143
-
Ideal Secret Sharing Schemes with Share SelectabilityEmura, Keita / Miyaji, Atsuko / Nomura, Akito / Rahman, Mohammad Shahriar / Soshi, Masakazu et al. | 2011
- 158
-
A Novel Pyramidal Dual-Tree Directional Filter Bank Domain Color Image Watermarking AlgorithmNiu, Panpan / Wang, Xiangyang / Lu, Mingyu et al. | 2011
- 173
-
Detection for Multiplicative Watermarking in DCT Domain by Cauchy ModelYin, Xiang / Peng, Shuoling / Zhu, Xinshan et al. | 2011
- 184
-
Extension of Barreto-Voloch Root Extraction MethodCao, Zhengjun / Fan, Xiao et al. | 2011
- 190
-
Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean FunctionsDu, Yusong / Zhang, Fangguo et al. | 2011
- 202
-
Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGAWang, Lei / Jing, Jiwu / Liu, Zongbin / Zhang, Lingchen / Pan, Wuqiong et al. | 2011
- 216
-
First Differential Attack on Full 32-Round GOSTCourtois, Nicolas T. / Misztal, Michał et al. | 2011
- 228
-
Collision Attack for the Hash Function Extended MD4Wang, Gaoli et al. | 2011
- 242
-
Linear Cryptanalysis of ARIA Block CipherLiu, Zhiqiang / Gu, Dawu / Liu, Ya / Li, Juanru / Li, Wei et al. | 2011
- 255
-
Latin Dances Revisited: New Analytic Results of Salsa20 and ChaChaIshiguro, Tsukasa / Kiyomoto, Shinsaku / Miyake, Yutaka et al. | 2011
- 267
-
Behavior Analysis-Based Dynamic Trust Measurement ModelWang, Dan / Zhou, Xiaodong / Zhao, Wenbing et al. | 2011
- 282
-
Improvement and Analysis of VDP Method in Time/Memory Tradeoff ApplicationsWang, Wenhao / Lin, Dongdai / Li, Zhenqi / Wang, Tianze et al. | 2011
- 297
-
Analyzing the Performance of Dither Modulation in Presence of Composite AttacksZhu, Xinshan et al. | 2011
- 306
-
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor NetworksZhu, Wen Tao / Deng, Robert H. / Zhou, Jianying / Bao, Feng et al. | 2011
- 319
-
A Unified Security Framework for Multi-domain Wireless Mesh NetworksWang, Ze / Ma, Maode / Liu, Wenju / Wei, Xixi et al. | 2011
- 330
-
Ontology Model-Based Static Analysis of Security VulnerabilitiesYu, Lian / Wu, Shi-Zhong / Guo, Tao / Dong, Guo-Wei / Wan, Cheng-Cheng / Jing, Yin-Hang et al. | 2011
- 345
-
A Multi-compositional Enforcement on Information Flow SecuritySun, Cong / Zhai, Ennan / Chen, Zhong / Ma, Jianfeng et al. | 2011
- 360
-
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented ProgrammingJiang, Jun / Jia, Xiaoqi / Feng, Dengguo / Zhang, Shengzhi / Liu, Peng et al. | 2011
- 374
-
An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching ScoresBadrinath, G. S. / Nigam, Aditya / Gupta, Phalguni et al. | 2011
- 388
-
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic CharacterizationTan, Zhiyuan / Jamdagni, Aruna / He, Xiangjian / Nanda, Priyadarsi / Liu, Ren Ping et al. | 2011
- 399
-
Situational Assessment of Intrusion Alerts: A Multi Attack Scenario EvaluationShiravi, Hadi / Shiravi, Ali / Ghorbani, Ali A. et al. | 2011
- 414
-
Minimising Anonymity Loss in Anonymity Networks under DoS AttacksYang, Mu / Sassone, Vladimiro et al. | 2011