CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks
暂无分享,去创建一个
Zhihua Xia | Xingming Sun | Wei Liang | Decai Sun | Zhiqiang Ruan | Xingming Sun | Zhihua Xia | Wei Liang | Decai Sun | Zhiqiang Ruan | Xingming Sun
[1] Yong Guan,et al. A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.
[2] Song Y. Yan,et al. Computing Prime Factorization And Discrete Logarithms: From Index Calculus To Xedni Calculus , 2003, Int. J. Comput. Math..
[3] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[4] Dali Wei,et al. Rectangular Grids Design to Balance Power Consumption for Homogeneous Sensor Networks with High Node Density , 2007 .
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Dirk Westhoff,et al. Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .
[8] Jingyu Hua,et al. A Novel Ad hoc Routing Protocol Based on Mobility Prediction , 2008 .
[9] Sanjay Kumar Madria,et al. SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.
[10] Sencun Zhu,et al. Attack-resilient time synchronization for wireless sensor networks , 2007, Ad Hoc Networks.
[11] Claudio Soriente,et al. Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks , 2009, Ad Hoc Networks.
[12] Wensheng Zhang,et al. Securing distributed data storage and retrieval in sensor networks , 2007, Pervasive Mob. Comput..