A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[3] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Joseph A. Paradiso,et al. Energy scavenging for mobile and wireless electronics , 2005, IEEE Pervasive Computing.
[5] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[6] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[7] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[8] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[9] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[10] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[11] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[12] Gaurav S. Sukhatme,et al. Studying the feasibility of energy harvesting in a mobile sensor network , 2003, 2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422).
[13] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[14] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[15] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[16] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[17] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[18] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[19] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[20] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[21] Kemal Bicakci,et al. One-Time sensors: a novel concept to mitigate node-capture attacks , 2005 .
[22] Deborah Estrin,et al. Sensor networks: a bridge to the physical world , 2004 .