Overview of security research in EYES
暂无分享,去创建一个
Luigi V. Mancini | Yee Wei Law | Pieter H. Hartel | Sandro Etalle | Roberto Di Pietro | Paul J.M. Havinga
[1] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[4] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[5] Yee Wei Law,et al. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.
[6] Roberto Di Pietro,et al. A Time Driven Methodology for Key Dimensioning in Multicast Communications , 2003, SEC.
[7] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] Sandro Etalle,et al. An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.
[10] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.
[11] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[12] Sushil Jajodia,et al. Efficient and secure keys management for wireless mobile communications , 2002, POMC '02.
[13] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[14] Roberto Di Pietro,et al. Connectivity properties of secure wireless sensor networks , 2004, SASN '04.
[15] Sushil Jajodia,et al. Secure Selective Exclusion in Ad Hoc Wireless Network , 2002, SEC.
[16] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[17] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[18] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[19] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[20] Yee Wei Law,et al. Assessing Security in Energy-Efficient Sensor Networks , 2003, SEC.
[21] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[22] Mihir Bellare,et al. Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques , 2000, ASIACRYPT.
[23] Yee Wei Law,et al. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract) , 2004 .
[24] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .