Data Authentication Model Based on Reed-solomon Error-correcting Codes in Wireless Sensor Networks
暂无分享,去创建一个
Xin Zhou | Jian Xu | Fucai Zhou | Jian Han | Fuxiang Li
[1] Adrian Perrig,et al. Flooding-resilient broadcast authentication for VANETs , 2011, MobiCom.
[2] Jianer Chen,et al. Efficient flooding in Wireless Sensor Networks secured with neighborhood keys , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[3] Haiyun Luo,et al. Denial of service attack-resistant flooding authentication in wireless sensor networks , 2010, Comput. Commun..
[4] ZhangJun,et al. Research on anonymous signatures and group signatures , 2008 .
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Jinsang Kim,et al. Step-by-Step Approach for Energy-Efficient Wireless Sensor Network , 2012 .
[7] Joseph M. Hellerstein,et al. Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[8] Xu Jian,et al. Hierarchical Hash List for Distributed Query Authentication , 2012 .
[9] Alex X. Liu,et al. SafeQ: Secure and Efficient Query Processing in Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Claude Castelluccia,et al. Toward clock skew based wireless sensor node services , 2010, 2010 The 5th Annual ICST Wireless Internet Conference (WICON).
[11] Orhan Dagdeviren,et al. A Survey of Agent Technologies for Wireless Sensor Networks , 2011 .
[12] Roberto Tamassia,et al. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures , 2007, ICICS.
[13] JiangHong Guo,et al. Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks , 2010, 2010 International Conference on Computational Intelligence and Security.
[14] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[15] Llanos Tobarra,et al. Formal Analysis of Sensor Network Encryption Protocol (SNEP) , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[16] Zhu Zhiliang. Data outsourcing authentication model based on authenticated data structures for cloud computing , 2011 .