Authenticated queries in sensor networks
暂无分享,去创建一个
[1] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[2] Tassos Dimitriou,et al. Secure and Efficient In-Network Processing for Sensor Networks , 2004 .
[3] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[4] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[5] David E. Culler,et al. The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.
[6] Bart Preneel,et al. Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks , 2005, SPC.
[7] Matthew K. Franklin,et al. Lower Bounds for Multicast Message Authentication , 2001, EUROCRYPT.
[8] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[9] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.
[10] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[11] Zinaida Benenson,et al. An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[12] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] Kefei Chen,et al. SDD: Secure Distributed Diffusion Protocol for Sensor Networks , 2004, ESAS.
[14] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[15] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[16] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[17] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[18] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[19] Sushil Jajodia,et al. LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.
[20] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[22] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[23] Shivakant Mishra,et al. Security support for in-network processing in Wireless Sensor Networks , 2003, SASN '03.
[24] Wei Hong,et al. The design of an acquisitional query processor for sensor networks , 2003, SIGMOD '03.
[25] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[26] Harald Vogt,et al. Exploring Message Authentication in Sensor Networks , 2004, ESAS.
[27] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[28] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[29] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[30] Ramesh Govindan,et al. Networking support for query processing in sensor networks , 2004, CACM.
[31] Yong Yao,et al. The cougar approach to in-network query processing in sensor networks , 2002, SGMD.