POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
暂无分享,去创建一个
[1] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[2] Roberto Di Pietro,et al. ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks , 2007, Ad Hoc Networks.
[3] Anish Arora,et al. Whisper: Local Secret Maintenance in Sensor Networks , 2003 .
[4] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[5] Gene Itkis,et al. Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions , 2002, SCN.
[6] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[7] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[8] Mihir Bellare,et al. Forward-Security in Private-Key Cryptography , 2003, CT-RSA.
[9] Deborah Estrin,et al. Rate-adaptive time synchronization for long-lived sensor networks , 2005, SIGMETRICS '05.
[10] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[11] Claude Castelluccia,et al. RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[12] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[13] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[14] Srdjan Capkun,et al. Secure time synchronization service for sensor networks , 2005, WiSe '05.
[15] Sushil Jajodia,et al. Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.
[16] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[17] Gene Tsudik,et al. DISH: Distributed Self-Healing in Unattended Sensor Networks , 2008, IACR Cryptol. ePrint Arch..
[18] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..