Constraints and Approaches for Distributed Sensor Network Security. dated September 1, 2000 DW Carman, PS Kruus, BJ Matt NAI Labs Technical Report No. 00-010, 2001 | 1056* | 2001 |
Constraints and approaches for distributed sensor network security (final) DW Carman, PS Kruus, BJ Matt DARPA Project report,(Cryptographic Technologies Group, Trusted Information …, 2000 | 1048 | 2000 |
TinyPK: securing sensor networks with public key technology R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004 | 998 | 2004 |
A survey of multicast security issues and architectures PS Kruus NAVAL RESEARCH LAB WASHINGTON DC, 1998 | 83 | 1998 |
Techniques and issues in multicast security PS Kruus, JP Macker NAVAL RESEARCH LAB WASHINGTON DC, 1998 | 79 | 1998 |
A survey of steganography techniques for image files P Kruus, C Scace, M Heyman, M Mundy Advanced Security Research Journal.[On line] 5 (1), 41-52, 2003 | 62 | 2003 |
Policy-based security management for large dynamic groups: An overview of the DCCM project PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ... discex, 0064, 2000 | 62 | 2000 |
System and method for key distribution in a hierarchical tree PT Dinsmore, M Heyman, P Kruus, AT Sherman US Patent 7,043,024, 2006 | 59 | 2006 |
In-band wormholes and countermeasures in OLSR networks P Kruus, D Sterne, R Gopaul, M Heyman, B Rivera, P Budulas, B Luu, ... Securecomm and Workshops, 2006, 1-11, 2006 | 43 | 2006 |
System and method for measuring staleness of attestation during booting between a first and second device by generating a first and second time and calculating a difference … DC Challener, PS Kruus US Patent 8,667,263, 2014 | 36 | 2014 |
Apparatus and Method for Preventing Access by Malware to Locally Backed Up Data DC Challener, PS Kruus, RA Fink, JF Farlow US Patent App. 15/255,551, 2017 | 25 | 2017 |
System and method for reusable efficient key distribution PT Dinsmore, M Heyman, P Kruus, AT Sherman US Patent 7,590,247, 2009 | 20 | 2009 |
Countering false accusations and collusion in the detection of in-band wormholes D Sterne, G Lawler, R Gopaul, B Rivera, K Marcus, P Kruus Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007 | 15 | 2007 |
A communications security architecture and cryptographic mechanisms for distributed sensor networks D Carman, B Matt, D Balenson, P Kruus DARPA SensIT Workshop, 1999 | 12 | 1999 |
Key management in distributed sensor networking D Carman, B Matt, P Kruus, D Balenson, D Branstad DARPA Sensor IT Workshop, 2000 | 7 | 2000 |
Creating and maintaining a good intrusion detection hierarchy in dynamic ad hoc networks A McAuley, K Manousakis, D Sterne, R Gopaul, P Kruus Military Communications Conference, 2006. MILCOM 2006. IEEE, 1-6, 2006 | 5 | 2006 |
Gravitational analysis of the in-band wormhole phenomenon R Gopaul, P Kruus, D Sterne, B Rivera ARMY RESEARCH LAB ADELPHI MD, 2006 | 4 | 2006 |
Environmentally protected data storage container PS Kruus, MD Heyman US Patent App. 12/152,823, 2009 | 3 | 2009 |
Dynamic cryptographic context management (DCCM) DM Balenson, P Dismore, M Heyman, PS Kruus, C Scace TRUSTED INFORMATION SYSTEMS INC GLENWOOD MD, 2000 | 3 | 2000 |
On reporting of the time of attestation measurements P Kruus, D Challener Military Communications Conference, MILCOM 2015-2015 IEEE, 354-359, 2015 | | 2015 |