ANSWER: autonomous wireless sensor network
暂无分享,去创建一个
[1] Stephan Olariu,et al. Training a Wireless Sensor Network , 2005, Mob. Networks Appl..
[2] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[3] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[4] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[5] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[6] 王艺明. Pawns: Satisfying the need for ubiquitous secure connectivity and location services , 2002 .
[7] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Deborah Estrin,et al. Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.
[9] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Donggang Liu,et al. Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks , 2003 .
[11] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[13] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[14] G. Tsudik,et al. Authentication of mobile users , 1994, IEEE Network.
[15] William J. Kaiser,et al. Methods for scalable self-assembly of ad hoc wireless sensor networks , 2004, IEEE Transactions on Mobile Computing.
[16] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[17] Hannes Federrath,et al. Project “anonymity and unobservability in the Internet” , 2000, CFP '00.
[18] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[19] V.V. Zhirnov,et al. New Frontiers: Self-Assembly and Nanoelectronics , 2001, Computer.
[20] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[21] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.
[22] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[23] Gregory J. Pottie,et al. Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..
[24] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[25] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[26] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[27] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[28] P. Ning,et al. Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗ , 2003 .
[29] Zygmunt J. Haas,et al. On the impact of alternate path routing for load balancing in mobile ad hoc networks , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[30] Brian Neil Levine,et al. A protocol for anonymous communication over the Internet , 2000, CCS.
[31] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[32] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[33] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[34] Sushil Jajodia,et al. Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.
[35] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[36] Stephan Olariu,et al. Wireless sensor networks: leveraging the virtual infrastructure , 2004, IEEE Network.
[37] Stephan Olariu,et al. Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.
[38] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[39] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[40] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[41] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[42] Xiaoyan Hong,et al. An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Networks , 2003 .
[43] Paramvir Bahl,et al. PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.
[44] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[45] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[46] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[47] Tian He,et al. Differentiated surveillance for sensor networks , 2003, SenSys '03.
[48] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[49] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[50] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[51] Chris J. Mitchell,et al. Security Vulnerabilities in Ad Hoc Networks , 2003 .
[52] Srdjan Capkun,et al. Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .
[53] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[54] Hugo Krawczyk,et al. Untraceable mobility or how to travel incognito , 1999, Comput. Networks.
[55] Stephan Olariu,et al. On modeling wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[56] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[57] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .