Active Bibliography

770 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
2 ANOTHER LOOK AT HMAC – Neal Koblitz, Alfred Menezes
483 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
1360 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
490 Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks – Yih-chun Hu - 2003
557 Practical Byzantine Fault Tolerance – Miguel Castro, Barbara Loskov
685 Ariadne: A secure on-demand routing protocol for ad hoc networks – Yih-chun Hu - 2002
1718 A Theory of the Learnable – L. G. Valiant - 1984