Kerberos Authentication in Wireless Sensor Networks
Key Agreement and Authentication Schemes Using Non-Commutative Semigroups
Key Distillation and the Secret-Bit Fraction
Key Distribution Scheme without Deployment Knowledge
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
Key Management in Mobile Sensor Networks
Key Management in Wireless Sensor Networks Using a Modified Blom Scheme
Key Reduction of McEliece's Cryptosystem Using List Decoding
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version)
Knapsack cryptosystems built on NP-hard instance
Knowledge Flow Analysis for Security Protocols
Kolmogorov complexity and cryptography