Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network
暂无分享,去创建一个
[1] Bartosz Zoltak. Tail-MAC: An Efficient Message Authentication Scheme for Stream Ciphers , 2004 .
[2] Sushil Jajodia,et al. LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.
[3] Dipankar Raychaudhuri,et al. Architecture and prototyping of an 802.11-based self-organizing hierarchical ad-hoc wireless network (SOHAN) , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[4] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[5] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[6] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[7] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[8] Yvo Desmedt,et al. A secure and scalable Group Key Exchange system , 2005, Inf. Process. Lett..
[9] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[10] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[11] Kang G. Shin,et al. LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.
[12] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[13] Mohamed F. Younis,et al. A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[14] Kenneth G. Paterson,et al. Deniable Authenticated Key Establishment for Internet Protocols , 2003, Security Protocols Workshop.
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Dipankar Raychaudhuri,et al. Routing protocols for self-organizing hierarchical ad-hoc wireless networks , 2003 .
[17] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[18] Lei Xie,et al. A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.
[19] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.