A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID
暂无分享,去创建一个
Yang Xiao | Fei Hu | Bo Sun | Alina Olteanu | Hongmei Deng | Yang Xiao | Hongmei Deng | Fei Hu | A. Olteanu | Bo Sun
[1] Yi Mu,et al. Convertible identity-based anonymous designated ring signatures , 2006, Int. J. Secur. Networks.
[2] Chik How Tan,et al. A new signature scheme without random oracles , 2006, Int. J. Secur. Networks.
[3] Matthew K. Franklin,et al. A survey of key evolving cryptosystems , 2006, Int. J. Secur. Networks.
[4] Hua Wang,et al. Security and privacy in RFID systems: [special issue of International Journal of Security and Networks] , 2010 .
[5] G. Marsaglia,et al. Fast Generation of Discrete Random Variables , 2004 .
[6] Xinyuan Wang. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones , 2006, Int. J. Secur. Networks.
[7] Fei Hu,et al. Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .
[8] Neeraj Suri,et al. An approach to synthesise safe systems , 2006, Int. J. Secur. Networks.
[9] Harald Niederreiter,et al. Introduction to finite fields and their applications: List of Symbols , 1986 .
[10] Joseph B. Evans,et al. Wireless networking security: open issues in trust, management, interoperation and measurement , 2006, Int. J. Secur. Networks.
[11] Yang Xiao,et al. NIS05-4: A Lightweight Secure Solution for RFID , 2006, IEEE Globecom 2006.
[12] G. Towl. Editorial , 2012, Evidence Based Mental Health.
[13] Donald E. Knuth. The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .
[14] Yi-Bing Lin,et al. End-to-end security mechanisms for SMS , 2006, Int. J. Secur. Networks.
[15] Mohan S. Kankanhalli,et al. Building trust in peer-to-peer systems: a review , 2006, Int. J. Secur. Networks.
[16] Hairong Qi,et al. Load-balanced key establishment methodologies in wireless sensor networks , 2006, Int. J. Secur. Networks.
[17] Pierre L'Ecuyer,et al. Bad Lattice Structures for Vectors of Nonsuccessive Values Produced by Some Linear Recurrences , 1997, INFORMS J. Comput..
[18] Yang Xiao,et al. Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..
[19] Shivakant Mishra,et al. Limiting DoS attacks during multihop data delivery in wireless sensor networks , 2006, Int. J. Secur. Networks.
[20] Lih-Yuan Deng,et al. A system of high-dimensional, efficient, long-cycle and portable uniform random number generators , 2003, TOMC.
[21] Yang Xiao,et al. Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining , 2008, Ad Hoc Networks.
[22] Xuemin Shen,et al. A self-encryption authentication protocol for teleconference services , 2006, Int. J. Secur. Networks.
[23] Aggelos Kiayias,et al. Secure scalable group signature with dynamic joins and separable authorities , 2006, Int. J. Secur. Networks.
[24] George Kesidis,et al. A taxonomy of internet traceback , 2006, Int. J. Secur. Networks.
[25] Yang Xiao,et al. A lightweight secure protocol for wireless sensor networks , 2006, Comput. Commun..
[26] Chik How Tan,et al. Low-power authenticated group key agreement for heterogeneous wireless networks , 2006, Int. J. Secur. Networks.
[27] Thomas Johansson,et al. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers , 2006, Int. J. Secur. Networks.
[28] Lih-Yuan Deng,et al. Efficient and portable multiple recursive generators of large order , 2005, TOMC.
[29] Vasileios Karyotis,et al. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.
[30] Mohamed G. Gouda,et al. Vulnerability analysis of certificate graphs , 2006, Int. J. Secur. Networks.
[31] Yang Xiao,et al. Low-cost wireless sensor networks for remote cardiac patients monitoring applications , 2008, Wirel. Commun. Mob. Comput..
[32] Myung J. Lee,et al. A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.
[33] Mahalingam Ramkumar,et al. Secure collaborations over message boards , 2006, Int. J. Secur. Networks.
[34] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[35] Yang Xiao,et al. Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..
[36] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[37] Li Liu,et al. A Virtual Password Scheme to Protect Passwords , 2008, 2008 IEEE International Conference on Communications.
[38] Dennis K. J. Lin,et al. Random Number Generation for the New Century , 2000 .
[39] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[40] Yang Xiao,et al. A Lightweight Secure Solution for RFID. , 2006 .
[41] E. Watson. Primitive Polynomials (Mod 2) , 1962 .
[42] Yang Xiao,et al. Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009, Wirel. Commun. Mob. Comput..
[43] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[44] Jamal N. Al-Karaki,et al. Analysis of routing security-energy trade-offs in wireless sensor networks , 2006, Int. J. Secur. Networks.
[45] W. H. Payne,et al. Coding the Lehmer pseudo-random number generator , 1969, CACM.
[46] Reuven R. Levary,et al. An adaptive expert system approach for intrusion detection , 2006, Int. J. Secur. Networks.
[47] Elisa Bertino,et al. Workflow authorisation in mediator-free environments , 2006, Int. J. Secur. Networks.
[48] Lih-Yuan Deng,et al. Design and Implementation of Efficient and Portable Multiple Recursive Generators with Few Zero Coefficients , 2008 .