Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks
暂无分享,去创建一个
[1] E. Leavline,et al. DATA MINING IN NETWORK SECURITY-TECHNIQUES & TOOLS : A RESEARCH PERSPECTIVE , 2013 .
[2] P. N. Barwal,et al. Wireless Sensor Networks : Security Issues , Challenges and Solutions , 2006 .
[3] R. Davis,et al. The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.
[4] R. Umarani,et al. A Survey on Various Most Common Encryption Techniques , 2012 .
[5] Debasis Das,et al. The Art of Cryptology: From Ancient Number System to Strange Number System , 2013 .
[6] Gajendra Singh,et al. Advance cryptography algorithm for improving data security , 2012 .
[7] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.
[8] Priti G. Harne,et al. Design and Implementation of a System for Denial of Service Attack Detection Based on Multivariate Correlation Analysis , 2015 .
[9] Ravi Sharma,et al. Study of Latest Emerging Trends on Cyber Security and its challenges to Society , 2012 .
[10] Siddharth Ghansela. Network Security: Attacks, Tools and Techniques , 2013 .
[11] C K Marigowda,et al. SECURITY VULNERABILITY ISSUES IN WIRELESS SENSOR NETWORKS: A SHORT SURVEY , 2013 .
[12] Banta Singh Jangra,et al. A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks , 2012 .
[13] Prerna Mahajan,et al. A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .
[14] Abdul Hanan Abdullah,et al. Security Issues and Attacks in Wireless Sensor Network , 2014 .
[15] Deepali Virmani,et al. Routing Attacks in Wireless Sensor Networks: A Survey , 2014, ArXiv.
[16] Usha Banerjee,et al. Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection , 2010 .
[17] Ching Ying Lin,et al. Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States” , 2013 .