Secure and Efficient WSN Communication Infrastructure
暂无分享,去创建一个
[1] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[2] George Krikis,et al. Design and implementation of efficient reconfigurable cipher algorithms for wireless sensor networks , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).
[3] Wen Tao Zhu. Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme , 2011, 2011 International Conference on Network Computing and Information Security.
[4] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[5] Zoran Bojkovic,et al. Security Issues in Wireless Sensor Networks , 2008 .
[6] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[7] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[8] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[9] Konstantinos Antonopoulos,et al. The effect of symmetric block ciphers on WSN performance and behavior , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[10] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[11] Christophe De Cannière,et al. Finding SHA-1 Characteristics: General Results and Applications , 2006, ASIACRYPT.
[12] Zubair A. Baig,et al. Distributed Denial of Service Attack Detection in Wireless Sensor Networks , 2008 .
[13] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[14] Nael B. Abu-Ghazaleh,et al. An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.
[15] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[16] V. Manjula,et al. Replication Attack Mitigations for Static and Mobile WSN , 2011, ArXiv.
[17] Bruce Schneier,et al. Comments on Twofish as an AES Candidate , 2000, AES Candidate Conference.
[18] Moti Yung,et al. Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[19] Sandeep Kumar,et al. Embedded end-to-end wireless security with ECDH key exchange , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[20] JeongGil Ko,et al. Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.
[21] M. McLoone,et al. Reconfigurable cryptographic RISC microprocessor , 2005, 2005 IEEE VLSI-TSA International Symposium on VLSI Design, Automation and Test, 2005. (VLSI-TSA-DAT)..