Please view the copyright notices at the bottom of this page prior to downloading any papers.
IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, March 2009, pp. 140-150.1 [IEEE Xplore entry]Tags: 2009, ad hoc networks, Author: He, W., Author: Huang, Y., Author: Lee, W.C., Author: Nahrstedt, K., Author: Sathyam, R., combinatorial key management, cryptographic key management, cryptography, data integrity, mission-critical wireless ad hoc networks, public-private key pairs, radio networks, security service, self-contained public key management scheme, SMOCK, telecommunication network management, ubiquitous computing
Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '07), pp.201-210, 19-23 March 2007.1 [IEEE Xplore entry]Tags: 2007, Author: He, W., Author: Huang, Y., Author: Lee, W.C., Author: Nahrstedt, K., Author: Sathyam, R., public key management scheme, SMOCK, wireless ad hoc networks
Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25, 2009, pp. 1233-1241.1 [IEEE Xplore entry]Tags: 2009, Author: Huang, Y., Author: Khurana, H., Author: Nahrstedt, K., Author: Wang, Q., buffering packets, buffering-free data processing, communication overhead, digital signatures, end-to-end computational latency, one-time signature schemes, packet loss tolerance, public key cryptography, public key distribution, time-critical multicast data authentication, time-valid one-time signature