Feasibility of position-based multivariate cryptosystems for WSN
暂无分享,去创建一个
[1] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[2] Sidi Mohamed El Yousfi Alaoui,et al. A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem , 2010, Selected Areas in Cryptography.
[3] Jintai Ding,et al. Square-Vinegar Signature Scheme , 2008, PQCrypto.
[4] Deepa Kundur,et al. Security-aware routing and localization for a directional mission critical network , 2010, IEEE Journal on Selected Areas in Communications.
[5] Alessandro Nordio,et al. Field Reconstruction in Sensor Networks With Coverage Holes and Packet Losses , 2011, IEEE Transactions on Signal Processing.
[6] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[7] A. Stelzer,et al. Position estimation techniques for the local position measurement system LPM , 2006, 2006 Asia-Pacific Microwave Conference.
[8] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[9] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[10] S Lanzisera,et al. Radio Frequency Time-of-Flight Distance Measurement for Low-Cost Wireless Sensor Localization , 2011, IEEE Sensors Journal.
[11] Faramarz Fekri,et al. A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[12] M. Vossiek,et al. Precise Distance and Velocity Measurement for Real Time Locating in Multipath Environments Using a Frequency-Modulated Continuous-Wave Secondary Radar Approach , 2008, IEEE Transactions on Microwave Theory and Techniques.
[13] M.R. Mahfouz,et al. Investigation of High-Accuracy Indoor 3-D Positioning Using UWB Technology , 2008, IEEE Transactions on Microwave Theory and Techniques.
[14] Radha Poovendran,et al. HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[15] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[16] Jacques Stern,et al. Practical Cryptanalysis of SFLASH , 2007, CRYPTO.
[17] Jintai Ding,et al. Algebraic Attack on HFE Revisited , 2008, ISC.
[18] Rafail Ostrovsky,et al. Position Based Cryptography , 2009, CRYPTO.
[19] Chen-Mou Cheng,et al. Could SFLASH be Repaired? , 2008, ICALP.
[20] Sarvesh Bhardwaj,et al. Secure and Robust Localization in a Wireless Ad Hoc Environment , 2009, IEEE Transactions on Vehicular Technology.
[21] Faramarz Fekri,et al. Public-key cryptography using paraunitary matrices , 2006, IEEE Transactions on Signal Processing.
[22] Bo-Yin Yang,et al. l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography , 2007, Public Key Cryptography.
[23] Jacques Stern,et al. Designing Identification Schemes with Keys of Short Size , 1994, CRYPTO.
[24] Daojing He,et al. Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[25] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[26] Anthony J. Peyton,et al. A Three-Dimensional Positioning Algorithm for Networked Wireless Sensors , 2011, IEEE Transactions on Instrumentation and Measurement.
[27] Jintai Ding,et al. Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.
[28] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[29] Ludovic Perret,et al. Cryptanalysis of MinRank , 2008, CRYPTO.
[30] Kiseon Kim,et al. Distance Estimation With Weighted Least Squares for Mobile Beacon-Based Localization in Wireless Sensor Networks , 2010, IEEE Signal Processing Letters.
[31] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[32] Jintai Ding,et al. Secure Electronic Voting , 2006, Advances in Information Security.
[33] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[34] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[35] Kiseon Kim,et al. Mobile Beacon-Based 3D-Localization with Multidimensional Scaling in Large Sensor Networks , 2010, IEEE Communications Letters.
[36] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[37] Jintai Ding,et al. A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation , 2004, Public Key Cryptography.
[38] Feipei Lai,et al. A "Medium-Field" Multivariate Public-Key Encryption Scheme , 2006, CT-RSA.
[39] Jacques Stern,et al. Cryptanalysis of SFLASH with Slightly Modified Parameters , 2007, EUROCRYPT.
[40] Yu Zhang,et al. Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems , 2008, IEEE Transactions on Information Forensics and Security.
[41] Azzedine Boukerche,et al. Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.
[42] David Evans,et al. Localization for mobile sensor networks , 2004, MobiCom '04.
[43] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[44] Zhi Ding,et al. Source Localization in Wireless Sensor Networks From Signal Time-of-Arrival Measurements , 2011, IEEE Transactions on Signal Processing.
[45] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[46] Chunming Qiao,et al. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes , 2010, IEEE Transactions on Mobile Computing.
[47] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[48] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[49] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[50] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[51] Jacques Stern,et al. Cryptanalysis of HFE with Internal Perturbation , 2007, Public Key Cryptography.
[52] Bart Preneel,et al. On the security of stepwise triangular systems , 2006, Des. Codes Cryptogr..
[53] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[54] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[55] Wenjing Lou,et al. Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..