Security in Sensor Networks
暂无分享,去创建一个
Anupam Joshi | Sasikanth Avancha | John Pinkston | J. M. Kizza | Sasikanth Avancha | A. Joshi | J. Pinkston
[1] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[2] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[3] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[4] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[5] Mani B. Srivastava,et al. SensorSim: a simulation framework for sensor networks , 2000, MSWIM '00.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Philippe Bonnet,et al. Towards Sensor Database Systems , 2001, Mobile Data Management.
[8] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[9] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[10] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[11] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[12] Yordan Kostov,et al. Low-cost optical instrumentation for biomedical measurements , 2000 .
[13] Samuel Madden,et al. Fjording the stream: an architecture for queries over streaming sensor data , 2002, Proceedings 18th International Conference on Data Engineering.