Collaborative authentication in unattended WSNs
暂无分享,去创建一个
Claudio Soriente | Roberto Di Pietro | Gene Tsudik | Angelo Spognardi | G. Tsudik | R. D. Pietro | A. Spognardi | Claudio Soriente
[1] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[2] Sushil Jajodia,et al. Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[3] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[4] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[5] Gene Tsudik,et al. DISH: Distributed Self-Healing , 2008, SSS.
[6] Gene Tsudik,et al. DISH: Distributed Self-Healing in Unattended Sensor Networks , 2008, IACR Cryptol. ePrint Arch..
[7] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[8] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[9] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[10] Claudio Soriente,et al. Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks , 2009, Ad Hoc Networks.
[11] Gene Tsudik,et al. Extended Abstract: Forward-Secure Sequential Aggregate Authentication , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Sushil Jajodia,et al. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007, TOSN.
[13] Gene Itkis,et al. Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions , 2002, SCN.
[14] Claudio Soriente,et al. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks , 2008, 2008 Symposium on Reliable Distributed Systems.
[15] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[16] Matthew K. Franklin,et al. A Generic Construction for Intrusion-Resilient Public-Key Encryption , 2004, CT-RSA.
[17] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[18] Jun Yang,et al. The interleaved authentication for filtering false reports in multipath routing based sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[19] Claudio Soriente,et al. Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary , 2008, IACR Cryptol. ePrint Arch..
[20] Srdjan Capkun,et al. Secure time synchronization service for sensor networks , 2005, WiSe '05.
[21] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[22] Gene Itkis,et al. SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.
[23] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[24] Guohong Cao,et al. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..