Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…With advances in hardware, asymmetric cryptography is fast becoming a viable option for small devices [9,18]. Nevertheless, we believe that there will always exist devices, ever smaller, with computational capabilities similar to the least powerful devices of today.…”
Section: Discussionmentioning
confidence: 99%
“…With advances in hardware, asymmetric cryptography is fast becoming a viable option for small devices [9,18]. Nevertheless, we believe that there will always exist devices, ever smaller, with computational capabilities similar to the least powerful devices of today.…”
Section: Discussionmentioning
confidence: 99%
“…The lack of group ID in the return message is a trigger to x that the return key information in intragroup. In this case, x is able to verify the identity of y, because Kyx = Kxy, due to the symmetry of our key establishment scheme in [3]. Node x responds with a h K xy (n x ||n y ||2), verifying to y that x has established the correct key.…”
Section: Pairwise Key Establishmentmentioning
confidence: 94%
“…Therefore, it is desirable to have a solution which provides secure key establishment without requiring specific location knowledge for each node. Claycomb et al proposed in [3] that in a group-based distribution, assuming nodes deployed together end up near each other, each group of nodes deployed be pre-keyed using key information unique to that group. Doing so would allow nodes containing keying information for a specific group A to establish pairwise keys with nodes from group A.…”
Section: Group-based Key Establishmentmentioning
confidence: 99%
See 1 more Smart Citation