Factors Impacting Key Management Effectiveness in Secured Wireless Networks
暂无分享,去创建一个
[1] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[2] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[3] Robin Kravets,et al. Composite key management for ad hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[4] T.A. Gulliver,et al. Hierarchical key management for mobile ad-hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[5] Paul Sass. Communications networks for the Force XXI Digitized Battlefield , 1999, Mob. Networks Appl..
[6] Jinwoo Park,et al. An implementation of wireless sensor network , 2004, IEEE Trans. Consumer Electron..
[7] Linda Doyle,et al. Ad hoc key management infrastructure , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[8] Sushil Jajodia,et al. An authorization model for a public key management service , 2001, TSEC.
[9] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[10] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[11] Tolga Acar,et al. Security Domains: Key Management in Large-Scale Systems , 2000, IEEE Software.
[12] Avishai Wool,et al. Key management for restricted multicast using broadcast encryption , 2000, TNET.
[13] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[14] Lemin Li,et al. Research and analysis on routing protocols for wireless sensor networks , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..
[15] Shouhuai Xu. On the security of group communication schemes based on symmetric key cryptosystems , 2005, SASN '05.
[16] Sumita Mishra,et al. Analysis of a hybrid key management solution for ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[17] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[18] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[19] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[20] Bertil Svensson,et al. Capacity limitations in wireless sensor networks , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).
[21] Liviu Iftode,et al. Locality driven key management architecture for mobile ad-hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[22] F. J. Adamouski. Encryption technology other than PKI , 1998, Proceedings IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology (Cat. No.98CH36209).
[23] Mohamed Eltoweissy,et al. SECK: survivable and efficient clustered keying for wireless sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[24] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[25] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[26] Jing Liu,et al. Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[27] W.A. Jansen. A second look at the SDNS key management protocol , 1993, Proceedings of 9th Annual Computer Security Applications Conference.
[28] Kwangjo Kim,et al. State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[29] Ozkan M. Erdem. EDKM: efficient distributed key management for mobile ad hoc networks , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[30] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[31] Serge Vaudenay,et al. Cryptography with Guardian Angels: Bringing civilization to pirates - Abstract , 2003 .
[32] Wang Yi-jun. Key Management in Mobile Ad Hoc Network , 2009 .
[33] Luiz A. DaSilva,et al. Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.
[34] Luca Salgarelli,et al. Smart PSK provisioning: a key-management and authentication scheme for wireless LANs , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[35] Byrav Ramamurthy,et al. CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[36] G. Keppel. Practical research: Planning and design 2nd ed. , 1980 .
[37] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[38] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[39] Randy H. Katz,et al. Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.
[40] He Ge. An efficient key management scheme for pervasive computing , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[41] Telecommunications Board. Cryptography's Role in Securing the Information Society , 1996 .
[42] Shon Harris,et al. CISSP Certification All-in-One Exam Guide , 2002 .
[43] Ashutosh Saxena,et al. Hierarchical key management scheme using polynomial interpolation , 2005, OPSR.
[44] Ali Bakirdan,et al. Security algorithms in wireless LAN: proprietary or nonproprietary , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[45] Chinya V. Ravishankar,et al. Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.
[46] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[47] Diane Kiwior,et al. Key management for secure multicast group communication in mobile networks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[48] D. K. Branstad,et al. Policy-based cryptographic key management: experience with the KRP project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[49] Houda Labiod,et al. KMS: a key management system for multi-provider interconnected Wi-Fi WLANs , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[50] Stephan Olariu,et al. Scalable cryptographic key management in wireless sensor networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[51] William T. Polk,et al. Public Key Infrastructures that Satisfy Security Goals , 2003, IEEE Internet Comput..
[52] Kia Makki,et al. Dynamic key management for secure routing in LCMRMG MANET , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).
[53] J. Giordano,et al. Fine-grained, scalable, and secure key management scheme for trusted military message systems , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[54] Dong Hoon Lee,et al. Secure and efficient key management for dynamic multicast groups , 2001, OPSR.
[55] Ingrid Verbauwhede,et al. Reducing radio energy consumption of key management protocols for wireless sensor networks , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).
[56] Songwu Lu,et al. Securing a Wireless World , 2006, Proceedings of the IEEE.
[57] William A. Arbaugh,et al. Wireless Network Security and Interworking , 2006, Proceedings of the IEEE.
[58] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[59] Sushil Jajodia,et al. Efficient and secure keys management for wireless mobile communications , 2002, POMC '02.
[60] Fei Hu,et al. Robust security in large-scale wireless actuator and sensor networks: a low energy two-level implementation , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..
[61] Constantine N. Manikopoulos,et al. Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[62] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[63] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[64] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[65] Danai Patiyoot. Security issues for wireless ATM networks , 2002, OPSR.
[66] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[67] Abhrajit Ghosh,et al. Last hop topology sensitive multicasting key managment , 2005, Q2SWinet '05.
[68] K. J. Ray Liu,et al. An efficient key management scheme for secure wireless multicast , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[69] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[70] Mohamed F. Younis,et al. Lightweight key management for wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[71] I. Sasase,et al. On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..
[72] Malur K. Sundareshan,et al. Secure communication in internet environments: a hierarchical key management scheme for end-to-end encryption , 1989, IEEE Trans. Commun..
[73] Vaduvur Bharghavan. Secure wireless LANs , 1994, CCS '94.
[74] Yuh-Min Tseng. A scalable key-management scheme with minimizing key storage for secure group communications , 2003, Int. J. Netw. Manag..
[75] W.A. Arbaugh. Wireless Security Is Different , 2003, Computer.
[76] N. Denzin,et al. The discipline and practice of qualitative research [Introduction]. Denzin & Y. S. Lincoln (Eds.), The handbook of qualitative research (2nd ed. , 2000 .
[77] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[78] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[79] Lein Harn,et al. Key management for decentralized computer network services , 1993, IEEE Trans. Commun..
[80] Zhang Shiyong,et al. Securing ad hoc networks through mobile agent , 2004, InfoSecu '04.
[81] Mohamed F. Younis,et al. A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[82] S. Srinivasan,et al. Mobile ad hoc network security - a taxonomy , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[83] Avishai Wool. Key management for encrypted broadcast , 1998, CCS '98.
[84] A. Yasinsac,et al. Ad hoc network security: peer identification and authentication using signal properties , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[85] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[86] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[87] Theodoulos Garefalakis,et al. Public key infrastructure in mobile systems , 2002 .
[88] Peter Gutmann,et al. Simplifying public key management , 2004, Computer.
[89] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[90] Donggang Liu,et al. Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.
[91] Takashi Ito,et al. A key pre-distribution scheme for secure sensor networks using probability density function of node deployment , 2005, SASN '05.
[92] Emil C. Lupu,et al. Towards flexible credential verification in mobile ad-hoc networks , 2002, POMC '02.
[93] Stephan Olariu,et al. ANSWER: autonomous wireless sensor network , 2005, Q2SWinet '05.
[94] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[95] D. O'Mahony,et al. Shared RSA key generation in a mobile ad hoc network , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[96] William A. Arbaugh,et al. Security problems in 802.11-based networks , 2003, CACM.
[97] Yong Guan,et al. A robust group-based key management scheme for wireless sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[98] T. Andrew Yang,et al. Wireless LAN security and laboratory designs , 2004 .
[99] Hamdy S. Soliman,et al. Application of synchronous dynamic encryption system in mobile wireless domains , 2005, Q2SWinet '05.
[100] Xiao Chen,et al. An efficient key management scheme in hierarchical sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[101] Yuguang Fang,et al. AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[102] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[103] Stephan Olariu,et al. Common data security network (CDSN) , 2005, Q2SWinet '05.
[104] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[105] Peng Liu,et al. Localized public-key management for mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[106] Mohammed Atiquzzaman,et al. Wireless sensor network for aircraft health monitoring , 2004, First International Conference on Broadband Networks.
[107] Virtual Bridged,et al. IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).
[108] R. Mollin. RSA and Public-Key Cryptography , 2002 .
[109] Izak Benbasat,et al. The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..
[110] Ozkan M. Erdem. Efficient self-organized key management for mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[111] Benny Pinkas. Efficient state updates for key management , 2004, Proceedings of the IEEE.
[112] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[113] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[114] Steve F. Russe. Wireless Network Security for Users , 2001, ITCC.
[115] Lei Wang,et al. Researches on scheme of pairwise key establishment for distributed sensor networks , 2005, WMuNeP.
[116] Johann van der Merwe,et al. Fully self-organized peer-to-peer key management for mobile ad hoc networks , 2005, WiSe '05.
[117] Kimberly A. Neuendorf,et al. The Content Analysis Guidebook , 2001 .
[118] Bernd Becker,et al. Securing wireless networks in a university environment , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[119] Qiong Zhang,et al. A centralized key management scheme for hierarchical access control , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[120] Jan M. Rabaey,et al. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking , 2000, Computer.
[121] George C. Hadjichristofi,et al. A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[122] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[123] Xiang-Yang Li,et al. Efficient hybrid key agreement protocol for wireless ad hoc networks , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.
[124] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[125] Peter G. Neumann. Crypto key management , 1997, CACM.
[126] Matthew K. Franklin,et al. The Ω key management service , 1996, CCS '96.
[127] Chen Junliang,et al. Secret key management based on variable authentication code in UPT system , 1998, ICCT'98. 1998 International Conference on Communication Technology. Proceedings (IEEE Cat. No.98EX243).
[128] Tom A. M. Kevenaar,et al. A security design for a general purpose, self-organizing, multihop ad hoc wireless network , 2003, SASN '03.
[129] Klaus Krippendorff,et al. Content Analysis: An Introduction to Its Methodology , 1980 .
[130] K. J. Ray Liu,et al. Topology-aware key management schemes for wireless multicast , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[131] Qijun Gu,et al. KTR: an efficient key management scheme for air access control , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[132] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[133] R. Stake. The art of case study research , 1995 .
[134] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[135] J. Morland,et al. A Case for the Case Study , 1991 .
[136] Ranga S. Ramanujan,et al. Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[137] Jyh-Cheng Chen,et al. Wireless LAN security and IEEE 802.11i , 2005, IEEE Wireless Communications.
[138] Mohamed F. Younis,et al. Key management in wireless ad hoc networks: collusion analysis and prevention , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[139] Radha Poovendran,et al. A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[140] Bart Preneel,et al. The wandering nodes: key management for low-power mobile ad hoc networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[141] E. L. Witzke,et al. Key management for large scale end-to-end encryption , 1994, 1994 Proceedings of IEEE International Carnahan Conference on Security Technology.
[142] Robin Kravets,et al. Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[143] Jukka Valkonen. Key Management in Ad-Hoc Networks , 2007 .
[144] Wen Song,et al. An Efficient Key Management Scheme for Secure Sensor Networks , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).
[145] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[146] Walter Fumy,et al. Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..
[147] K. Passerini,et al. Wireless network security - a discussion from a business perspective , 2005, Symposium, 2005 Wireless Telecommunications.
[148] Jalel Ben-Othman,et al. Data security in ad hoc networks using multipath routing , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[149] Jeff Wilson,et al. Securing a wireless network , 2002, SIGUCCS '02.
[150] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[151] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[152] Don Davis. Compliance Defects in Public Key Cryptography , 1996, USENIX Security Symposium.
[153] Mahalingam Ramkumar,et al. An efficient key predistribution scheme for ad hoc network security , 2005, IEEE Journal on Selected Areas in Communications.
[154] Anthony M. Townsend,et al. Why Wi-Fi wants to be free , 2003, CACM.
[155] A. Price,et al. A key pre-distribution scheme for wireless sensor networks , 2005, Symposium, 2005 Wireless Telecommunications.
[156] Aura Ganz,et al. Security protocol for IEEE 802.11 wireless local area network , 1998, Mob. Networks Appl..
[157] J. Martin Leo Manickam,et al. Secure routing protocol for mobile ad-hoc networks , 2007, SCSC.
[158] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[159] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[160] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[161] Chu-Hsing Lin,et al. An efficient hierarchical key management scheme using symmetric encryptions , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[162] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[163] Aldar C.-F. Chan,et al. Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[164] Jim Binkley,et al. Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems , 2001, Wirel. Networks.
[165] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[166] Winston M. Tellis,et al. APPLICATION OF A CASE STUDY METHODOLOGY , 1997 .
[167] Ashok K. Agrawala,et al. Performance of IEEE 802.11 based wireless sensor networks in noisy environments , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[168] Fei Hu,et al. Security in wireless actor & sensor networks (WASN): towards a hierarchical re-keying design , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[169] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[170] K. J. Ray Liu,et al. A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.
[171] Mohamed Eltoweissy,et al. TKGS: verifiable threshold-based key generation scheme in open wireless ad hoc networks , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).
[172] Paul G. Comba. Approaches to cryptographic key management , 1986, PCS '86.
[173] Amy B. Woszczynski,et al. Proceedings of the 1st annual conference on Information security curriculum development , 2004 .
[174] Michael S Lewis-Beck,et al. Sage university papers. Series Quantitative applications in the social sciences , 2008 .
[175] Yi Yang,et al. An overview of Wireless Sensor Network and applications , 2003, Proceedings of the 35th Southeastern Symposium on System Theory, 2003..
[176] Mehmet Ulema,et al. Wireless sensor networks: architectures, protocols, and management , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[177] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[178] Anup Kumar,et al. A framework for integrated Internet and ad hoc network security , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[179] ChenJyh-Cheng,et al. Wireless LAN security and IEEE 802.11i , 2005 .
[180] Simon J. Shepherd,et al. Cryptographic security Techniques for wireless networks , 1999, OPSR.
[181] Jianhua Li,et al. Combinatorial optimization for wireless sensor networks , 2005, Proceedings of 2005 IEEE International Workshop on VLSI Design and Video Technology, 2005..