Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[2] Deep Medhi,et al. Modeling Pairwise Key Establishment for Random Key Predistribution in Large-Scale Sensor Networks , 2007, IEEE/ACM Transactions on Networking.
[3] Dong Xuan,et al. Network Decoupling for Secure Communications in Wireless Sensor Networks , 2006, 200614th IEEE International Workshop on Quality of Service.
[4] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[5] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[6] Faramarz Fekri,et al. Threshold Key-Establishment in Distributed Sensor Networks Using a Multivariate Scheme , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[7] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[8] Thomas F. La Porta,et al. Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[9] Emre Ertin,et al. Kansei: a high-fidelity sensing testbed , 2006, IEEE Internet Computing.
[10] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[11] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[12] B. R. Badrinath,et al. Trajectory based forwarding and its applications , 2003, MobiCom '03.
[13] Min Wu,et al. Coordinated sensor deployment for improving secure communications and sensing coverage , 2005, SASN '05.
[14] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Arno Wacker,et al. A new approach for establishing pairwise keys for securing wireless sensor networks , 2005, SenSys '05.
[17] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[18] Shie-Yuan Wang,et al. TCP trunking: design, implementation and performance , 1999, Proceedings. Seventh International Conference on Network Protocols.
[19] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[20] Donggang Liu,et al. Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.
[21] Alex C. Snoeren,et al. Decoupling policy from mechanism in Internet routing , 2004, Comput. Commun. Rev..
[22] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[23] Nitin H. Vaidya,et al. Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[24] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] Faramarz Fekri,et al. Key pre-distribution in wireless sensor networks using multivariate polynomials , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[27] V. Kulathumani,et al. Kansei: a testbed for sensing at scale , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[28] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.