Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices
暂无分享,去创建一个
[1] Alec Wolman,et al. I am a sensor, and I approve this message , 2010, HotMobile '10.
[2] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Giles Hogben,et al. Privacy Features: Privacy features of European eID card specifications , 2008 .
[4] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[5] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[6] Qun Li,et al. Distributed User Access Control in Sensor Networks , 2006, DCOSS.
[7] Christof Paar,et al. A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.
[8] Mary Lou Ingeholm,et al. RFID in healthcare. , 2006, Journal of AHIMA.
[9] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[10] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[11] Bart De Decker,et al. Personalized Mobile Services with Lightweight Security in a Sports Association , 2010, MobiSec.
[12] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[13] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[14] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[15] Tadayoshi Kohno,et al. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.
[16] Sandra Dominikus,et al. D.VAM11 -- Suggested Algorithms for Light-Weight Cryptography , 2006 .
[17] Refik Molva,et al. Efficient Access Control for Wireless Sensor Data , 2009, Ad Hoc Sens. Wirel. Networks.
[18] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[19] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[20] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[21] Danny Dolev,et al. On the Security of Public Key Protocols (Extended Abstract) , 1981, FOCS.
[22] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[23] Ingrid Verbauwhede,et al. A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor , 2007, WISA.