Study of Wireless Authentication Center with Mixed Encryption in WSN
暂无分享,去创建一个
Jing Zhai | Jiancheng Qin | Yiqin Lu | Ronghuan Zhu | Yiqin Lu | Jiancheng Qin | Jing Zhai | Ronghuan Zhu
[1] Claudio Soriente,et al. Collaborative authentication in unattended WSNs , 2009, WiSec '09.
[2] Lu Yiqin,et al. Design Of Embedded Web Server Based On MCU And IPv6 , 2013 .
[3] Vincent Rijmen,et al. The First 10 Years of Advanced Encryption , 2010, IEEE Security & Privacy.
[4] Douglas R. Stinson,et al. On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.
[5] Mohamed Hamdi,et al. A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Hyunyoung Lee,et al. A Distributed Authentication Scheme for a Wireless Sensing System , 2005 .
[7] Kwangjo Kim,et al. Untraceable Mobile Node Authentication in WSN , 2010, Sensors.
[8] Nael B. Abu-Ghazaleh,et al. An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.
[9] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[10] John Langford,et al. Provably Secure Steganography , 2009, IEEE Trans. Computers.
[11] Mircea Vladutiu,et al. Secret data communication system using steganography, AES and RSA , 2011, 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME).
[12] A. Q. Zhao,et al. Research on Dynamic Routing Mechanisms in Wireless Sensor Networks , 2014, TheScientificWorldJournal.
[13] Ajay Kakkar,et al. Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network , 2012 .
[14] Yongtae Shin,et al. Implementation and performance analysis of AES-128 CBC algorithm in WSNs , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[15] Lu Yiqin,et al. Wireless authentication center based on embedded Wi-Fi technology , 2014 .
[16] Qian Zhang,et al. A Robust Entity Authentication in Wireless Sensor Networks , 2009, 2009 International Conference on Information Engineering and Computer Science.
[17] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.