A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies
暂无分享,去创建一个
[1] Bruce Potter. Threat Modelling: Microsoft SDL Threat Modelling Tool , 2009 .
[2] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[3] Serge Chaumette,et al. Secure distributed computing on a Java Card/spl trade/ grid , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[4] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[5] P. Kumarawadu,et al. Secure Routing in Sensor Networks , 2007, 2007 Canadian Conference on Electrical and Computer Engineering.
[6] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[7] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[8] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[9] Chih-Chun Chang,et al. Security in Wireless Sensor Networks : Status, Problems, Current Technologies and Trends , 2006 .
[10] Viktor K. Prasanna,et al. Issues in designing middleware for wireless sensor networks , 2004, IEEE Network.
[11] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[12] Sanjay Kumar Madria,et al. Sensor networks: an overview , 2003 .
[13] Ericsson Hungary,et al. SECURITY ANALYSIS OF SENSOR NETWORKS , 2005 .
[14] Jose A. Gutierrez,et al. Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensors with IEEE 802.15.4 , 2003 .
[15] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[16] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[17] Dennis G. Abraham,et al. Transaction Security System , 1991, IBM Syst. J..
[18] Philip Levis,et al. Maté: a tiny virtual machine for sensor networks , 2002, ASPLOS X.
[19] Zinaida Benenson,et al. Tampering with Motes: Real-World Attacks on Wireless Sensor Networks , 2006, Sicherheit.
[20] Andrew Hutchison,et al. Ticket Based Identity System for DRM , 2006, ISSA.
[21] Frank Swiderski,et al. Threat Modeling , 2018, Hacking Connected Cars.
[22] Felix C. Freiling,et al. On the Feasibility and Meaning of Security in Sensor Networks , 2005 .
[23] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[24] Sungyoung Lee,et al. Securing Distributed Wireless Sensor Networks: Issues and Guidelines , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).