NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks
暂无分享,去创建一个
[1] Tatu Ylonen,et al. SSH: secure login connections over the internet , 1996 .
[2] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[3] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[4] Shakil Ahmad,et al. Authenticated Encryption in WSN Using eSTREAM Ciphers , 2009, ISA.
[5] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[6] Marine Minier,et al. Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.
[7] Matt Henricksen. Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[8] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[9] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[10] Bo Sheng,et al. WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes , 2007 .
[11] Cristina Alcaraz,et al. A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes , 2007, Mob. Networks Appl..
[12] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[13] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[14] Pardeep Kumar,et al. A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[15] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[16] Firdous Kausar,et al. A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment , 2009, ISA.
[17] HyeongRag Kim,et al. NLM-128, an Improved LM-Type Summation Generator with 2-Bit memories , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[18] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[19] Hyotaek Lim,et al. Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption , 2007, IACR Cryptol. ePrint Arch..
[20] LawYee Wei,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006 .
[21] Spyros Tragoudas,et al. A security protocol for sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..