Pragmatic Security for Constrained Wireless Networks
暂无分享,去创建一个
Janet Truitt Jenkins | Graylin Jay | Benjamin Grizzell | Phillip Bradford | Graylin Jay | P. Bradford | J. Jenkins | Benjamin Grizzell
[1] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[2] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[3] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[4] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[5] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[6] Shlomo Engelberg. Spread Spectrum from Two Perspectives , 2003, SIAM Rev..
[7] Mahmut T. Kandemir,et al. Compiler-directed proactive power management for networks , 2005, CASES '05.
[8] Scott A. Mahlke,et al. Compiler managed dynamic instruction placement in a low-power code cache , 2005, International Symposium on Code Generation and Optimization.
[9] José María Sierra,et al. Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers , 2001, IMACC.
[10] Shuang Liu,et al. Implementing the TEA algorithm on sensors , 2004, ACM-SE 42.
[11] Christos H. Papadimitriou,et al. Worst-case equilibria , 1999 .
[12] Phillip G. Bradford,et al. Foundations of Security for Hash Chains in Ad Hoc Networks , 2005, Cluster Computing.
[13] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[14] Luiz A. DaSilva,et al. A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[15] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[16] Adrian Perrig,et al. Secure Broadcast Communication , 2003, Springer US.
[17] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.
[18] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[19] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[20] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[21] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[22] Gustavus J. Simmons,et al. Cryptanalysis and protocol failures , 1994, CACM.
[23] Leonid Reyzin,et al. Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.
[24] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.