Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters
暂无分享,去创建一个
[1] H. Eberle,et al. Architectural Extensions for Elliptic Curve Cryptography over GF ( 2 m ) , 2005 .
[2] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[3] Peng Ning,et al. Containing denial-of-service attacks in broadcast authentication in sensor networks , 2007, MobiHoc '07.
[4] Sushil Jajodia,et al. Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[5] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[6] Adrian Perrig,et al. Seven cardinal properties of sensor network broadcast authentication , 2006, SASN '06.
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[9] Shiuh-Pyng Shieh,et al. An efficient broadcast authentication scheme in wireless sensor networks , 2006, ASIACCS '06.
[10] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[11] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[12] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[13] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[14] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[15] Michael Mitzenmacher,et al. Compressed bloom filters , 2001, PODC '01.