Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity
暂无分享,去创建一个
Sergey D. Andreev | Aleksandr Ometov | Yevgeni Koucheryavy | Sergey Bezzateev | Konstantin Zhidanov | Roman Florea
[1] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[2] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[3] Cunsheng Ding,et al. Secret sharing schemes from three classes of linear codes , 2006, IEEE Transactions on Information Theory.
[4] Ying Wang,et al. An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..
[5] Jan Willemson,et al. Privacy-Preserving Wireless Medical Sensor Network , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[7] Reihaneh Safavi-Naini,et al. Democratic Key Escrow Scheme , 1997, ACISP.
[8] Carlisle Adams,et al. Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .
[9] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[10] Stefan Parkvall,et al. Device-to-Device Communications for National Security and Public Safety , 2014, IEEE Access.
[11] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[12] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[13] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[16] Michael N. Johnstone,et al. Security Aspects of Military Sensor-Based Defence Systems , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[17] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[18] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[19] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[20] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[21] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Olga Galinina,et al. Cellular traffic offloading onto network-assisted device-to-device connections , 2014, IEEE Communications Magazine.
[24] Jeong Hyun Yi,et al. On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[25] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[26] James L. Massey,et al. Minimal Codewords and Secret Sharing , 1999 .
[27] Jing Deng,et al. Wireless ad hoc networks , 2003 .
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[30] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.