Toward Secure Low Rate Wireless Personal Area Networks
暂无分享,去创建一个
[1] Levente Buttyán,et al. Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case , 2003, PWC.
[2] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[3] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[5] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[6] Hak-Lim Ko,et al. A switched beamforming system with multiuser detectors , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).
[7] Yan Huang,et al. NeuRon/spl trade/ netform: a self-organizing wireless sensor network , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.
[8] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] Wayne E. Stark,et al. Frequency-hopped spread spectrum in the presence of a follower partial-band jammer , 1993, IEEE Trans. Commun..
[11] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[12] Kyung Sup Kwak,et al. Multiuser detection scheme using adaptive antenna array over Rayleigh fading channels , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).
[13] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[14] Michael Roe,et al. Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.
[15] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[16] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[17] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[18] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[19] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[20] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[21] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[22] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[23] Michael B. Pursley,et al. Routing in frequency-hop packet radio networks with partial-band jamming , 1993, IEEE Trans. Commun..
[24] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[25] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[26] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[27] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[28] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[29] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[30] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[31] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[32] Haiyun Luo,et al. Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .
[33] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[34] Markus Jakobsson,et al. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks , 2003, MobiHoc '03.
[35] Ian D. Chakeres,et al. AODVjr, AODV simplified , 2002, MOCO.
[36] Myung J. Lee,et al. Will IEEE 802.15.4 make ubiquitous networking a reality?: a discussion on a potential low power, low bit rate standard , 2004, IEEE Communications Magazine.
[37] Vikram Srinivasan,et al. Optimal rate allocation and traffic splits for energy efficient routing in ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.