Pragmatic Security for Constrained Wireless Networks

[1]  Shivakant Mishra,et al.  Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.

[2]  David Brumley,et al.  Remote timing attacks are practical , 2003, Comput. Networks.

[3]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[4]  Adrian Perrig,et al.  The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.

[5]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[6]  Shlomo Engelberg Spread Spectrum from Two Perspectives , 2003, SIAM Rev..

[7]  Mahmut T. Kandemir,et al.  Compiler-directed proactive power management for networks , 2005, CASES '05.

[8]  Scott A. Mahlke,et al.  Compiler managed dynamic instruction placement in a low-power code cache , 2005, International Symposium on Code Generation and Optimization.

[9]  José María Sierra,et al.  Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers , 2001, IMACC.

[10]  Shuang Liu,et al.  Implementing the TEA algorithm on sensors , 2004, ACM-SE 42.

[11]  Christos H. Papadimitriou,et al.  Worst-case equilibria , 1999 .

[12]  Phillip G. Bradford,et al.  Foundations of Security for Hash Chains in Ad Hoc Networks , 2005, Cluster Computing.

[13]  Levente Buttyán,et al.  Report on a working session on security in wireless ad hoc networks , 2003, MOCO.

[14]  Luiz A. DaSilva,et al.  A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[15]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[16]  Adrian Perrig,et al.  Secure Broadcast Communication , 2003, Springer US.

[17]  Radha Poovendran,et al.  SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.

[18]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[19]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[20]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[21]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[22]  Gustavus J. Simmons,et al.  Cryptanalysis and protocol failures , 1994, CACM.

[23]  Leonid Reyzin,et al.  Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.

[24]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.