Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
暂无分享,去创建一个
[1] Jaydip Sen,et al. Security in Wireless Sensor Networks , 2013, ArXiv.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Andreas Willig,et al. Protocols and Architectures for Wireless Sensor Networks , 2005 .
[4] W. K. Yip,et al. A divisible extension of the Brands digital cash protocol: k-term coins implemented via secret sharing , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).
[5] Mike Bond,et al. Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.
[6] Xenofon Koutsoukos,et al. Consensus in networked multi-agent systems with adversaries , 2011 .
[7] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[8] Qing Zhao,et al. On the lifetime of wireless sensor networks , 2005, IEEE Communications Letters.
[9] Mikhail J. Atallah,et al. A Survey of Anti-Tamper Technologies , 2004 .
[10] A. S. Poornima,et al. A New Approach to Securing Broadcast Data in Sensor Networks , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[11] Keith M. Martin,et al. Updating the parameters of a threshold scheme by minimal broadcast , 2005, IEEE Transactions on Information Theory.
[12] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[13] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[14] Dennis Shasha,et al. The many faces of consensus in distributed systems , 1992, Computer.
[15] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[16] Yi Xu,et al. A survey on the communication architectures in smart grid , 2011, Comput. Networks.
[17] Ning Lu,et al. Smart-grid security issues , 2010, IEEE Security & Privacy.