Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis
暂无分享,去创建一个
Radha Poovendran | Patrick Tague | Jason Rogers | David Slater | R. Poovendran | P. Tague | D. Slater | Jason Rogers
[1] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[2] Kamal Jain. Security based on network topology against the wiretapping attack , 2004, IEEE Wireless Communications.
[3] Gregory Dobson,et al. Worst-Case Analysis of Greedy Heuristics for Integer Programming with Nonnegative Data , 1982, Math. Oper. Res..
[4] A. Bloch. On methods for the construction of networks dual to non-planar networks , 1946 .
[5] Vasek Chvátal,et al. A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..
[6] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[7] Reinhard Diestel,et al. Graph Theory , 1997 .
[8] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[9] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[10] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[11] Radha Poovendran,et al. A canonical seed assignment model for key predistribution in wireless sensor networks , 2007, TOSN.
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] R. Koetter,et al. The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[14] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[17] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..