End-to-end security for sleepy smart object networks
暂无分享,去创建一个
[1] Ioannis Chatzigiannakis,et al. Wiselib: A Generic Algorithm Library for Heterogeneous Sensor Networks , 2010, EWSN.
[2] Christof Paar,et al. Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes , 2007, ESAS.
[3] Martina Zitterbart,et al. Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.
[4] Zach Shelby,et al. CoRE Link Format , 2010 .
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Burton S. Kaliski,et al. PKCS #1: RSA Encryption Version 1.5 , 1998, RFC.
[7] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[8] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[9] Jens Palsberg,et al. Avrora: scalable sensor network simulation with precise timing , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[10] Hermann Seuschek,et al. Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography , 2008, IACR Cryptol. ePrint Arch..
[11] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[12] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[13] Razi Hassan,et al. Asymmetric-Key Cryptography for Contiki , 2010 .
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[15] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[16] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[17] Arjen K. Lenstra,et al. Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction , 2012, Int. J. Appl. Cryptogr..
[18] David L. Mills,et al. Network Time Protocol (Version 3) Specification, Implementation and Analysis , 1992, RFC.
[19] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Ricardo Dahab,et al. Efficient implementation of elliptic curve cryptography in wireless sensors , 2010, Adv. Math. Commun..
[21] Jari Arkko,et al. Media Types for Sensor Markup Language (SenML) , 2012 .
[22] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[23] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[24] Pedro José Marrón,et al. COOJA/MSPSim: interoperability testing for wireless sensor networks , 2009, SimuTools.
[25] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[26] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[27] Chin-Tser Huang,et al. LOFT: Low-Overhead Freshness Transmission in Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[28] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[29] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[30] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.