Security and Deployment Issues in a Sensor Network
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[3] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[4] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[5] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[6] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[7] James Foti,et al. Status of the Advanced Encryption Standard (AES) Development Effort , 1999 .
[8] David L. Mills,et al. Network Time Protocol (Version 3) Specification, Implementation and Analysis , 1992, RFC.
[9] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .