An efficient broadcast authentication scheme in wireless sensor networks
暂无分享,去创建一个
Shiuh-Pyng Shieh | Chih-Ming Hsieh | Warren W. Lin | Shang-Ming Chang | S. Shieh | Chih-Ming Hsieh | S. Chang | W. Lin
[1] Mihir Bellare,et al. Collision-Resistant Hashing: Towards Making UOWHFs Practical , 1997, CRYPTO.
[2] Refik Molva,et al. Efficient Multicast Packet Authentication , 2003, NDSS.
[3] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[4] Daniel A. Spielman,et al. Practical loss-resilient codes , 1997, STOC '97.
[5] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[6] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[7] Edoardo S. Biagioni,et al. The Application of Remote Sensor Technology To Assist the Recovery of Rare and Endangered Species , 2002, Int. J. High Perform. Comput. Appl..
[8] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[9] Edwin K. P. Chong,et al. Efficient multicast stream authentication using erasure codes , 2003, TSEC.
[10] Adrian Perrig,et al. Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.
[11] Luigi Rizzo,et al. Effective erasure codes for reliable computing , 1997 .
[12] Jessica Staddon,et al. Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[14] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[15] Luigi Rizzo,et al. Effective erasure codes for reliable computer communication protocols , 1997, CCRV.
[16] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.
[17] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[18] Galen H. Sasaki,et al. Wireless sensor placement for reliable and efficient data collection , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[19] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[20] Leonid Reyzin,et al. Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.
[21] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[22] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[23] Dawn Xiaodong Song,et al. Expander graphs for digital stream authentication and robust overlay networks , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[24] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.