Key Management Protocols for Wireless Sensor Networks Diplomarbeit
暂无分享,去创建一个
[1] Yee Wei Law,et al. How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[2] Ingrid Verbauwhede,et al. Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .
[3] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[4] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[5] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[6] Shiuh-Pyng Shieh,et al. Adaptive Random Key Distribution Schemes for Wireless Sensor Networks , 2005 .
[7] Deborah Estrin,et al. Target classification and localization in habitat monitoring , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[8] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[9] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[11] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[12] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[13] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[14] Samir Chatterjee,et al. A Secure Key Management Scheme for Sensor Networks , 2004, AMCIS.
[15] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[16] Matt Welsh,et al. Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[17] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[18] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[19] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[20] Kwangjo Kim,et al. State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[21] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[22] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[23] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[24] Issa M. Khalil,et al. SECOS : Key Management for Scalable and Energy Efficient Crypto On Sensors , 2003 .
[25] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[26] Ricardo Morla. Vision of Congestion-Free Road Traffic and Cooperating Objects , 2005 .
[27] Gyula Simon,et al. Sensor network-based countersniper system , 2004, SenSys '04.
[28] Ingrid Verbauwhede,et al. Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.
[29] Yee Wei Law,et al. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.
[30] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[31] Bruno Dutertre,et al. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .
[32] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..