Security co-existence of wireless sensor networks and RFID for pervasive computing
暂无分享,去创建一个
Yang Xiao | Hsiao-Hwa Chen | Bo Sun | Chung-Chih Li | T. Andrew Yang | Yang Xiao | Hsiao-Hwa Chen | Chung-Chih Li | Bo Sun | T. Yang
[1] David Thomas,et al. The Art in Computer Programming , 2001 .
[2] Sencun Zhu,et al. Attack-resilient time synchronization for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[3] Robert Cole,et al. Computer Communications , 1982, Springer New York.
[4] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.
[5] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[6] Donggang Liu,et al. Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.
[7] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[8] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[9] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[10] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[11] Yang Xiao,et al. A Lightweight Secure Solution for RFID. , 2006 .
[12] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[13] T. Sejnowski,et al. RFID authentication protocol for low-cost tags , 2001 .
[14] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[15] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[16] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[17] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[18] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[19] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[20] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[21] Stephen A. Weis. New foundations for efficient authentication, commutative cryptography, and private disjointness testing , 2006 .
[22] Donggang Liu,et al. Detecting Misused Keys in Wireless Sensor Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[23] Donggang Liu,et al. Group-based key predistribution for wireless sensor networks , 2008, TOSN.
[24] Yang Xiao,et al. A lightweight secure protocol for wireless sensor networks , 2006, Comput. Commun..
[25] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[26] Donald Ervin Knuth,et al. The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .