Securing Sensor Reports in Wireless Sensor Networks*
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[2] Markus Jakobsson,et al. Fractal Merkle Tree Representation and Traversal , 2003, CT-RSA.
[3] Markus Jakobsson,et al. Fractal hash sequence representation and traversal , 2002, Proceedings IEEE International Symposium on Information Theory,.
[4] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Yaron Sella. On The Computation-Storage Trade-Offs of Hash Chain Traversal , 2003, Financial Cryptography.
[7] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[8] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[9] Markus Jakobsson,et al. Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.