Low energy identity-based trusted access control scheme for Wireless Sensor Network
暂无分享,去创建一个
[1] Rolf Oppliger. SSL and TLS: Theory and Practice , 2009 .
[2] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[3] Jean-Philippe Babau,et al. An Ontology for Attacks in Wireless Sensor Networks , 2007 .
[4] Johann Großschädl,et al. Reassessing the TCG specifications for trusted computing in mobile and embedded systems , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[5] S. Shankar Sastry,et al. Attacks And Defenses Of Ubiquitous Sensor Networks , 2009 .
[6] Srivaths Ravi,et al. Energy and execution time analysis of a software-based trusted platform module , 2007 .
[7] Yusnani Mohd Yussoff,et al. Trusted Wireless Sensor Node Platform , 2010, WCE 2010.
[8] W. Marsden. I and J , 2012 .
[9] Luther Martin,et al. Introduction to Identity-Based Encryption , 2008 .
[10] Colin Boyd,et al. ID-based One-pass Authenticated Key Establishment , 2008, AISC.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Leendert van Doorn,et al. A Practical Guide to Trusted Computing , 2007 .
[13] Peter I. Corke,et al. secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.
[14] Srivaths Ravi,et al. Energy and Execution Time Analysis of a Software-based Trusted Platform Module , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.
[15] Piotr Szczechowiak,et al. Practical Identity-Based Key Agreement For Secure Communication in Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[16] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[17] YangYang,et al. Wireless sensor and actuator networks , 2010 .
[18] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[19] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[20] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[21] Pavan Sikka,et al. Wireless Sensor and Actuator Networks : 2-year progress report July 2004 to June 2006 , 2006 .