Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes
暂无分享,去创建一个
Dirk Westhoff | Gregor Leander | Thorsten Kranz | Oliver Stecklina | Stephan Kornemann | Ramona Jung | Felix Grehl | Dennis Schweer | Katharina Mollus
[1] Anne Canteaut,et al. PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) , 2012, IACR Cryptol. ePrint Arch..
[2] Barry K. Gilbert,et al. Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications , 2014, LATINCRYPT.
[3] David Starobinski,et al. Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[4] Mohammad Abdur Razzaque,et al. Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks , 2014, Sensors.
[5] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[6] Peter Langendörfer,et al. A fair energy trade multi-hop routing in wireless sensor networks , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).
[7] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[8] Dan Boneh,et al. Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.
[9] Peter Langendörfer,et al. Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[10] Dirk Westhoff,et al. A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme , 2009, WiSec '09.
[11] Jason Smith,et al. The SIMON and SPECK Families of Lightweight Block Ciphers , 2013, IACR Cryptol. ePrint Arch..
[12] David E. Culler,et al. Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[13] Christof Paar,et al. Block Ciphers - Focus on the Linear Layer (feat. PRIDE) , 2014, CRYPTO.
[14] Dirk Westhoff,et al. Security enhanced multi-hop over the air reprogramming with Fountain Codes , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[15] Dirk Westhoff,et al. Data obfuscation with network coding , 2012, Comput. Commun..
[16] Tao Jiang,et al. An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding , 2013, IEEE Transactions on Computers.
[17] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.