Practical broadcast authentication in sensor networks
暂无分享,去创建一个
[1] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[2] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[3] Donggang Liu,et al. Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks , 2003 .
[4] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[5] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[6] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[7] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[8] Yih-Chun Hu. Efficient Security Mechanisms for Routing Protocols , 2003 .
[9] P. Ning,et al. Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .
[10] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[11] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[12] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[13] Adrian Perrig,et al. Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.
[14] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[15] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[16] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[17] Dawn Song,et al. TESLA: Multicast Source Authentication Transform , 2000 .
[18] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[19] Sushil Jajodia,et al. LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.
[20] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[21] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[22] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[23] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[24] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[25] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[26] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[27] Yih-Chun Hu,et al. Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.
[28] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.