Secure and efficient sharing aggregation scheme for data protection in WSNs
暂无分享,去创建一个
Abdelkamel Tari | Ahcène Bounceur | Mawloud Omar | Feriel Bouakkaz | A. Bounceur | A. Tari | Mawloud Omar | Feriel Bouakkaz
[1] Manuel Koschuch,et al. Applicability of multiparty computation schemes for Wireless Sensor Networks , 2010, 2010 International Conference on Data Communication Networking (DCNET).
[2] Mohamed Hamdi,et al. An elliptic threshold signature framework for k-security in wireless sensor networks , 2008, 2008 15th IEEE International Conference on Electronics, Circuits and Systems.
[3] M. Tahar Kechadi,et al. CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.
[4] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[5] A. Zomaya,et al. A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..
[6] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[7] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[8] Jing-Feng Li,et al. Secure Monitoring Scheme Based on Identity-Based Threshold Signcryption for Wireless Sensor Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[9] Shen Yu. MMμTESLA: Broadcast Authentication Protocol for Multiple-Base-Station Sensor Networks , 2007 .
[10] Adam Dunkels,et al. Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .
[11] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[12] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[13] Ian F. Akyildiz,et al. Wireless Sensor Networks: Akyildiz/Wireless Sensor Networks , 2010 .
[14] Habib M. Ammari,et al. The Art of Wireless Sensor Networks: Volume 1 Fundamentals , 2013 .
[15] Habib M. Ammari,et al. The art of wireless sensor networks , 2014 .
[16] Khyati Chaudhary,et al. Survey on group authentication in wireless sensor networks , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[17] Marcelo Dias de Amorim,et al. Looking Around First: Localized Potential-Based Clustering in Spontaneous Networks , 2007, IEEE Communications Letters.
[18] Kamaljit Singh,et al. Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks , 2013 .