next up previous
Next: About this document Up: SPINS: Security Protocols for Previous: Acknowledgments

Full paper: Postscript, PS.GZ, PDF


References

1
Secure Microcontrollers for SmartCards. http://www.atmel.com/atmel/acrobat/1065s.pdf.

2
Steven Bellovin and Michael Merrit. Augmented encrypted key exchange: a password-based protocol secure against dictionary atttacks and password file compromise. In First ACM Conference on Computer and Communications Security CCS-1, pages 244-250, 1993.

3
David W. Carman, Peter S. Kruus, and Brian J. Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000.

4
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, and Randy H. Katz. An architecture for a secure service discovery service. In Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 24 - 35, Seattle, WA USA, August 1999.

5
D. Johnson and D.A. Maltz and J. Broch. The dynamic source routing protocol for mobile ad hoc networks (internet-draft). In Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999.

6
Joan Daemen and Vincent Rijmen. AES proposal: Rijndael, March 1999.

7
iButton: A Java-Powered Cryptographic iButton. http://www.ibutton.com/ibuttons/java.html.

8
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.

9
Whitfield Diffie and Martin E. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397-427, March 1979.

10
Armando Fox and Steven D. Gribble. Security on the move: indirect authentication using Kerberos. In Second Annual International Conference on Mobile Computing and Networking (MOBICOM 1996), pages 155-164, White Plains, NY USA, November 1996.

11
R. Gennaro and P. Rohatgi. How to sign digital streams. In Burt Kaliski, editor, Advances in Cryptology - Crypto '97, pages 180-197, Berlin, 1997. Springer-Verlag. Lecture Notes in Computer Science Volume 1294.

12
Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer Security, 28:270-299, 1984.

13
Z.J. Haas and M. Perlman. The zone routing protocol (ZRP) for ad hoc networks (Internet-Draft). 1998.

14
Neil M. Haller. The S/KEY one-time password system. In ISOC, 1994.

15
D. Harkins and D. Carrel. The internet key exchange (IKE). Request for Comments 2409, Information Sciences Institute, University of Southern California, November 1998.

16
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, November 2000.

17
D.B. Johnson and D.A. Maltz. Dynamic source routing in ad-hoc wireless networks. In Mobile Computing, 1996.

18
Young-Bae Ko and Nitin Vaidya. Location-aided routing (LAR) in mobile ad hoc networks. In Proceedings of the Fourth International Conference on Mobile Computing and Networking (MobiCom'98), October 1998.

19
J. Kohl and C. Neuman. RFC 1510: The Kerberos Network Authentication Service (V5), September 1993. Status: PROPOSED STANDARD.

20
L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, October 1979.

21
H. Lipmaa, P. Rogaway, and D. Wagner. Counter mode encryption. http://csrc.nist.gov/encryption/modes/.

22
Alfred J. Menezes, Paul van Oorschot, and Scott Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.

23
S. P. Miller, C. Neuman, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorization system. In Project Athena Technical Plan, page section E.2.1, 1987.

24
N. Modadugu, D. Boneh, and M. Kim. Generating RSA keys on a handheld using an untrusted server. In RSA 2000, 2000.

25
NIST. Advanced encryption standard (AES) development effort. http://csrc.nist.gov/encryption/aes/, October 2000.

26
V.D. Park and M.S. Corson. A highly adaptable distributed routing algorithm for mobile wireless networks. In IEEE INFOCOMM'97, 1997.

27
Bhrat Patel and Jon Crowcroft. Ticket based service access for the mobile user. In Third annual ACM/IEEE international conference on Mobile computing and networking, pages 223-233, Budapest Hungary, September 1997.

28
C.E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM Symposium on Communication, Architectures and Applications, 1994.

29
C.E. Perkins and E.M. Royer. Ad hoc on-demand distance vector routing. In IEEE WMCSA'99, February 1999.

30
Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In Network and Distributed System Security Symposium, NDSS '01, February 2001.

31
Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. Efficient authentication and signing of multicast streams over lossy channels. In IEEE Symposium on Security and Privacy, May 2000.

32
K. S. J. Pister, J. M. Kahn, and B. E. Boser. Smart dust: Wireless networks of millimeter-scale sensor nodes, 1999.

33
R. L. Rivest. The RC5 encryption algorithm. Proc. 1st Workshop on Fast Software Encryption, pages 86-96, 1995.

34
Ronald L. Rivest. The MD5 message-digest algorithm. Internet Request for Comments, April 1992. RFC 1321.

35
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.

36
Pankaj Rohatgi. A compact and fast hybrid signature scheme for multicast packet authentication. In 6th ACM Conference on Computer and Communications Security, November 1999.

37
S. Marti and T. Giuli and K. Lai and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of Mobicom 2000, August 2000.

38
Bruce Schneier. Applied Cryptography (Second Edition). John Wiley & Sons, 1996.

39
Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In B. Christianson, B. Crispo, and M. Roe, editors, Security Protocols, 7th International Workshop. Springer Verlag Berlin Heidelberg, 1999.

40
David Tennenhouse. Embedding the Internet: Proactive computing. Communications of the ACM, 43(5):43-43, 2000.

41
U. S. National Institute of Standards and Technology (NIST). DES model of operation. Federal Information Processing Standards Publication 81 (FIPS PUB 81).

42
U. S. National Institute of Standards and Technology (NIST). Data Encryption Standard (DES). Draft Federal Information Processing Standards Publication 46-3 (FIPS PUB 46-3), January 1999.

43
David Wheeler and Roger Needham. TEA, a tiny encryption algorithm.

http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-tea.html, November 1994.

44
Gideon Yuval. Reinventing the Travois: Encryption/MAC in 30 ROM bytes. In Proc. 4th Workshop on Fast Software Encryption, 1997.

45
L. Zhou and Z.J. Hass. Securing ad hoc networks. 13(6), November/December 1999.


next up previous
Next: About this document Up: SPINS: Security Protocols for Previous: Acknowledgments

Adrian Perrig
Fri Jun 1 22:51:44 PDT 2001