Certificateless based Quantum Cryptosystem for Ad-Hoc UWB-IR
暂无分享,去创建一个
[1] Shrikanth Narayanan,et al. Collaborative classification applications in sensor networks , 2002, Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002.
[2] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[3] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[4] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[5] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[6] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[7] Victor C. M. Leung,et al. Key management issues in wireless sensor networks: current proposals and future developments , 2007, IEEE Wireless Communications.
[8] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[9] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[10] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[11] Chuan-Ming Liu,et al. Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[12] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[13] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[14] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] Sanjay Jha,et al. Wireless Sensor Networks for Battlefield Surveillance , 2006 .
[19] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[20] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[21] Yu Hen Hu,et al. Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..
[22] Frédéric Valette,et al. On the Security of the CCM Encryption Mode and of a Slight Variant , 2008, ACNS.
[23] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[24] Tassos Dimitriou,et al. LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.
[25] Jung Hee Cheon,et al. New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.