A mutual authentication scheme with key agreement for industrial wireless network
暂无分享,去创建一个
Ping Wang | Min Wei | Keecheon Kim | Min Wei | Keecheon Kim | Ping Wang
[1] Mihir Bellare,et al. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks , 2002, CRYPTO.
[2] Wang Hong,et al. Real-time communication in WIA-PA industrial wireless networks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[3] Yanjiang Yang,et al. Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.
[4] Jing Dong,et al. Toward secure network coding in wireless networks: Threats and challenges , 2008, 2008 4th Workshop on Secure Network Protocols.
[5] Mikael Gidlund,et al. Integration of WirelessHART networks in Distributed Control Systems using PROFINET IO , 2010, 2010 8th IEEE International Conference on Industrial Informatics.
[6] Shudong Jin,et al. LEAP: Localized Energy-Aware Prediction for data collection in wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[7] Yu Liu,et al. A New Security Scheme for Wireless Sensor Networks , 2011 .
[8] Vijay Varadharajan,et al. A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[9] Yongsuk Park,et al. Security Architecture for IEEE 802.15.4-based Wireless Sensor Network , 2009, 2009 4th International Symposium on Wireless Pervasive Computing.
[10] D. Meintanis,et al. On the Power Consumption of Security Algorithms Employed in Wireless Networks , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.