Efficient Hybrid Method for Intrinsic Security Over Wireless Sensor Network
暂无分享,去创建一个
[1] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[2] M. Sudha. Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography , 2012, CSA 2012.
[3] Jeffrey G. Andrews,et al. Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[4] V. Ramaswamy. Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect , 2008 .
[5] Moe Z. Win,et al. Intentional Network Interference for Denial of Wireless Eavesdropping , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[6] Bhalaji N. Dr. PERFORMANCE EVALUATION OF FLYING WIRELESS NETWORK WITH VANET ROUTING PROTOCOL , 2016 .
[7] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.
[8] Jian Shen,et al. Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.
[9] Simon Pietro Romano,et al. A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[10] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[11] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[12] Zhong Ming,et al. An Intelligent Wireless Sensor Networks System with Multiple Servers Communication , 2015, Int. J. Distributed Sens. Networks.
[13] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[14] Amir Ghasemi,et al. Interference Aggregation in Spectrum-Sensing Cognitive Wireless Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.
[15] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .