RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN
暂无分享,去创建一个
Wei Liang | Xiaoyan Chen | Yuntao Wang | Zhiqiang Ruan | Zhiqiang Ruan | Wei Liang | Xiaoyan Chen | Yuntao Wang
[1] Zhide Chen,et al. Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks , 2016, Int. J. Commun. Syst..
[2] Arya Mazumdar,et al. Bounds on the Size of Locally Recoverable Codes , 2015, IEEE Transactions on Information Theory.
[3] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Yang Yu,et al. Query privacy in wireless sensor networks , 2007, SECON.
[6] Wensheng Zhang,et al. ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query , 2009, IEEE INFOCOM 2009.
[7] David E. Culler,et al. Reliable transfer on wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[8] Meng Zhang,et al. A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication , 2012, KSII Trans. Internet Inf. Syst..
[9] P. Vijay Kumar,et al. Codes with local regeneration , 2012, 2013 IEEE International Symposium on Information Theory.
[10] Ashok Kumar Das,et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..
[11] Shahrokh Valaee,et al. WLC12-4: Reliable and Energy Efficient Transport Layer for Sensor Networks , 2006, IEEE Globecom 2006.
[12] Kannan Ramchandran,et al. On secure distributed data storage under repair dynamics , 2010, 2010 IEEE International Symposium on Information Theory.
[13] Camilla Hollanti,et al. Constructions and Properties of Linear Locally Repairable Codes , 2016, IEEE Transactions on Information Theory.
[14] Gregory W. Wornell,et al. Update-Efficiency and Local Repairability Limits for Capacity Approaching Codes , 2013, IEEE Journal on Selected Areas in Communications.
[15] Baochun Li,et al. Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[16] Shangguang Wang,et al. Detecting SYN flooding attacks based on traffic prediction , 2012, Secur. Commun. Networks.
[17] Lihao Xu,et al. Efficient Encoding Schedules for XOR-Based Erasure Codes , 2014, IEEE Transactions on Computers.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[20] Xue Li,et al. A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value , 2015, J. Sensors.
[21] Wei Hong,et al. TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.
[22] I. Reed,et al. Polynomial Codes Over Certain Finite Fields , 1960 .
[23] Bo Sheng,et al. Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[24] Zhihua Xia,et al. CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks , 2010 .
[25] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[26] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[27] Paul J. M. Havinga,et al. Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[28] Alexandros G. Dimakis,et al. Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[29] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[30] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.