Network Security Architecture for Demand Response/Sensor Networks
暂无分享,去创建一个
Deirdre K. Mulligan | P. A. Subrahmanyam | Umesh Shankar | Erin Jones | David Wagner | Jack I. Lerner | D. Wagner | E. E. Jones | U. Shankar | D. Mulligan | P. Subrahmanyam
[1] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[2] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[3] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[4] J Quittner,et al. Invasion of privacy. , 1997, Time.
[5] Dawn Song,et al. Key distribution techniques for sensor networks , 2004 .
[6] J. Mitola,et al. Cognitive radio for flexible mobile multimedia communications , 1999, 1999 IEEE International Workshop on Mobile Multimedia Communications (MoMuC'99) (Cat. No.99EX384).
[7] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[8] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[9] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[10] Yuliang Zheng,et al. Cryptographically resilient functions , 1997, IEEE Trans. Inf. Theory.
[11] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[12] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[13] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[14] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[15] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[16] Martina Zitterbart,et al. Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks , 2005 .
[17] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..