Updatable Key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor Network
暂无分享,去创建一个
[1] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[2] Sencun Zhu,et al. Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks , 2008, ACM Trans. Sens. Networks.
[3] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[4] Rabi N. Mahapatra,et al. Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[5] Xiaojiang Du,et al. Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..
[6] Gene Tsudik,et al. Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.
[7] Subir K. Biswas,et al. Network-assisted sink navigation for distributed data gathering: Stability and delay-energy trade-offs , 2010, Comput. Commun..
[8] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[9] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[10] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[11] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[12] Ashraf Suyyagh,et al. Ad Hoc networks security challenges , 2010, 2010 7th International Multi- Conference on Systems, Signals and Devices.
[13] Giuseppe Anastasi,et al. Reliable and energy-efficient data collection in sparse sensor networks with mobile elements , 2009, Perform. Evaluation.
[14] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.